x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:12 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) dup3(r1, r0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xedc0) write$nbd(r2, &(0x7f0000000000)={0x67446698, 0x1, 0x4, 0x0, 0x3, "46ba117f8fcd7775bb3a1a2da43354aacc01c426a0a11a5f7668842213498f8f153fc85746a7cf8b35fec69cdcdcc648b54188a4463206c74e67d2a118c61ae29fca3488a7925ccd0d922845aaaaccb5dc97f71d793fdba83509dd3dddf1fb026e223ee45397f4c7748778556127636d2754d4ac85b2bf69680cc4bf5803b1a1df69527e27c393e6a50329d4a029a45bc7d2ab90e4e545e8d50db8b2d2ccf97abf2ecbcad9b751936a8f61d1d581f5a0461da0f12ff646669a7add1c57518d8f"}, 0xd0) clone(0x20986100, 0x0, 0x0, 0x0, &(0x7f0000000100)="d353ff072d68b2e4dc14aa5fa8b3d94c22") 05:37:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x0, 0x0, 0x1a, 0x3d, 0x0, 0x0, 0xa000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x231f}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x2) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f00000000c0)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e38e06c5fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b53606000000000000007c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df1001000000000694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde317fad4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b22645cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f580968af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb010100000000000001a047526865c888c9ff36056cc4ad258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d819164300"}) ioctl$KVM_SET_MP_STATE(r5, 0x4004ae99, &(0x7f0000000000)=0x100005) ioctl$KVM_RUN(r5, 0xae80, 0x0) 05:37:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 353.094536] kvm: vcpu 0: requested 128 ns lapic timer period limited to 200000 ns 05:37:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x200000, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x7d, 0x1, "1e9fd0d9fbd5d8cc4e27588c915ca1daff42e6c70fc65732d263fc344f61623250bbf6d7df6b20f40f884423b1ca17e26e1cc5853371e5464b62ed950f9f21c7151199f79086c533c748ac6fa1419e9ca69f1a108f4869028bfee2729092d19b3efe88f41901b308f7beba3e57a71549e0fc59d851"}, &(0x7f0000000140), 0x400) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r2, r1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r3, 0x0, 0xedc0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r5, r4, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r6, 0x0, 0xedc0) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r8, r7, 0x0) connect$inet6(r7, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r9 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r7, r9, 0x0, 0xedc0) r10 = socket$inet6(0xa, 0x2, 0x0) r11 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r11, r10, 0x0) connect$inet6(r10, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r12 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r13 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) connect$llc(r13, &(0x7f0000000200)={0x1a, 0x18, 0x56, 0x80, 0x8, 0x9, @random="c830eda4a6aa"}, 0x10) sendfile(r10, r12, 0x0, 0xedc0) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYPTR=&(0x7f00000008c0)=ANY=[@ANYBLOB="da506d23c5cb42445ac99f1d8182f7784b105249f79cea509a81a2e08051cd07061feb944ac6946a0414b58a3069bee24fc29006af5756b3084eb5d87887c60aec6152477b8f59ab87754b5cd9913ce3cfec0f50c1a5d4c1f9e153e6f34ee3db79e1673eee678e3335a31ab7d0674d204f70f06a4f446bd7e20c0f61af446cf37a546b67c81efaccf64a01e17b35ead23a976ba6fbd56f0526a5c41a88ee2bc1a85846771256d4910c8d99ceec70d8da4ccd7221b407df6886137b92b41ee635c9f4a0d3409918de0b837015cfcea3131bf3242800b0d92ef500d51e47545dc1617275a9f261ca8534fd89287d0e031593ff74784f565d", @ANYRESDEC, @ANYBLOB="20b35ab67e706d824379ac75a7beedaa58eec790f119d9ab3c8247174864c722cdc524c85a679aac0bef6e27731af56c35730124e4c0ad695d4716d7e1c177620d967d80683093cae8f25b597be6e966e3e339", @ANYRESDEC=0x0, @ANYRESOCT, @ANYRESHEX=0x0, @ANYRESHEX]], 0x1}, 0x1, 0xfdffffff00000000, 0x0, 0x40}, 0x0) [ 353.391500] SELinux: policydb version 2621461 does not match my version range 15-31 [ 353.430936] SELinux: failed to load policy 05:37:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:37:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"6c64125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a760800000000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb0300aa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afb1c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc788f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d819164300"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000000c0)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x1ff, 0x0, [{0x2, 0x9, 0x1, [], 0xf}, {}, {}, {}, {0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0xfd}, {0x0, 0x0, 0x0, [], 0x74}, {}, {0x0, 0x0, 0x0, [], 0x4}, {}, {}, {0x0, 0xfc}, {}, {}, {0x1}]}}) 05:37:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 353.831627] SELinux: policydb version 2621461 does not match my version range 15-31 [ 353.845931] SELinux: failed to load policy [ 353.935993] kvm: vcpu 0: requested 128 ns lapic timer period limited to 200000 ns 05:37:13 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$bt_cmtp(0x1f, 0x3, 0x5) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="c4000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c1151ca678c9e6d000000000000000000000000000000000000000000000c001f00080008000000000092034fa5f3441f1bce700e4ab74d7c24"], 0xc4}}, 0x0) 05:37:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:13 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xfffffdaf) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000001c0)) chdir(&(0x7f0000000100)='./file0\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x2a) vmsplice(r1, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000300)={0x9e77b1939f3ffc1c, 0x2, 0x1, 0x0, 0x3, 0x0, 0x0, 0x2}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/dev_mcast\x00') sendfile(r3, 0xffffffffffffffff, 0xfffffffffffffffe, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0xc76549796527f5c6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext, 0x20002200b, 0x2, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x2000000009, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='keyring\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x12, 0x1a6273f2b2e289f7, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_TIMESTAMP(r5, 0x1, 0x26, &(0x7f0000000140), 0x0) close(r4) r6 = socket(0x1, 0x800, 0x0) setsockopt(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000d52ff0), 0x0) close(r6) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x200, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@initdev}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0x85) getgroups(0x2, &(0x7f0000000740)=[0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) socket$inet(0x2, 0x3, 0x0) bind$inet(r2, &(0x7f0000000680)={0x2, 0x4e23, @multicast1}, 0x10) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) r9 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendfile(r9, r8, &(0x7f0000000000), 0x1) r10 = socket$unix(0x1, 0x1, 0x0) r11 = dup2(r10, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r11, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@initdev}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0x77) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000600)) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x3f, 0x0) 05:37:13 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xedc0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r4, r3, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r5, 0x0, 0xedc0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x75) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='selinuxfs\x00', 0xc0ed0000, 0x0) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r8}]]}}}]}, 0x38}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$can_bcm(r5, &(0x7f00000001c0)={&(0x7f0000000080)={0x1d, r8}, 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x3, 0x422, 0x1, {0x0, 0x2710}, {r9, r10/1000+30000}, {0x4, 0x1}, 0x1, @canfd={{0x3, 0x1, 0x0, 0x1}, 0x25, 0x0, 0x0, 0x0, "54942c2251fc76035d0f41378d7c109e1ee2d68fbcfc210804d93bf2c2b8a39798de412e1505016e5b5f755b9df2f66b45c3fe6161b4ccf543bf3834b656971c"}}, 0x80}, 0x1, 0x0, 0x0, 0x40}, 0x1) [ 354.213129] net_ratelimit: 15 callbacks suppressed [ 354.213158] protocol 88fb is buggy, dev hsr_slave_0 [ 354.224887] protocol 88fb is buggy, dev hsr_slave_1 [ 354.232469] protocol 88fb is buggy, dev hsr_slave_0 [ 354.237689] netlink: 'syz-executor.4': attribute type 31 has an invalid length. [ 354.239107] protocol 88fb is buggy, dev hsr_slave_1 [ 354.271397] netlink: 'syz-executor.4': attribute type 31 has an invalid length. 05:37:13 executing program 4: stat(0x0, 0x0) getegid() lstat(&(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000300)) socket$inet_tcp(0x2, 0x1, 0x0) clock_gettime(0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@initdev={0xac, 0x1e, 0x0, 0x0}, @local}, 0x8) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, r0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xedc0) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x0, 0x0, [], 0x5, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}]}, 0xc8) syz_open_dev$mice(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x8242, 0x80000001, 0x7, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[], &(0x7f000095dffc)) unshare(0x0) 05:37:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:14 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xfffffdaf) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000001c0)) chdir(&(0x7f0000000100)='./file0\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x2a) vmsplice(r1, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000300)={0x9e77b1939f3ffc1c, 0x2, 0x1, 0x0, 0x3, 0x0, 0x0, 0x2}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/dev_mcast\x00') sendfile(r3, 0xffffffffffffffff, 0xfffffffffffffffe, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0xc76549796527f5c6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext, 0x20002200b, 0x2, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x2000000009, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='keyring\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x12, 0x1a6273f2b2e289f7, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_TIMESTAMP(r5, 0x1, 0x26, &(0x7f0000000140), 0x0) close(r4) r6 = socket(0x1, 0x800, 0x0) setsockopt(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000d52ff0), 0x0) close(r6) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x200, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@initdev}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0x85) getgroups(0x2, &(0x7f0000000740)=[0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) socket$inet(0x2, 0x3, 0x0) bind$inet(r2, &(0x7f0000000680)={0x2, 0x4e23, @multicast1}, 0x10) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) r9 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendfile(r9, r8, &(0x7f0000000000), 0x1) r10 = socket$unix(0x1, 0x1, 0x0) r11 = dup2(r10, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r11, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@initdev}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0x77) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000600)) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x3f, 0x0) [ 354.835763] nbd_handle_cmd: 18 callbacks suppressed [ 354.835780] block nbd2: Attempted send on invalid socket [ 354.846468] print_req_error: 18 callbacks suppressed [ 354.846479] print_req_error: I/O error, dev nbd2, sector 0 [ 354.860083] f2fs_msg: 18 callbacks suppressed [ 354.860130] F2FS-fs (nbd2): Unable to read 1th superblock [ 354.912101] block nbd2: Attempted send on invalid socket [ 354.918127] print_req_error: I/O error, dev nbd2, sector 8 [ 354.927095] F2FS-fs (nbd2): Unable to read 2th superblock [ 354.943619] block nbd2: Attempted send on invalid socket [ 354.949218] print_req_error: I/O error, dev nbd2, sector 0 [ 354.956249] F2FS-fs (nbd2): Unable to read 1th superblock [ 354.975165] block nbd2: Attempted send on invalid socket [ 354.980853] print_req_error: I/O error, dev nbd2, sector 8 [ 354.996271] F2FS-fs (nbd2): Unable to read 2th superblock [ 355.012454] protocol 88fb is buggy, dev hsr_slave_0 [ 355.018564] protocol 88fb is buggy, dev hsr_slave_1 [ 355.167946] protocol 88fb is buggy, dev hsr_slave_0 [ 355.173461] protocol 88fb is buggy, dev hsr_slave_1 [ 355.727789] protocol 88fb is buggy, dev hsr_slave_0 [ 355.732960] protocol 88fb is buggy, dev hsr_slave_1 05:37:16 executing program 3: io_setup(0x30, &(0x7f0000000180)) keyctl$update(0x2, 0x0, &(0x7f0000000240)="db40951195b653", 0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={0x0, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:37:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:16 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) syz_init_net_socket$ax25(0x3, 0x3, 0xc4) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20fda000}, 0x200000}) 05:37:16 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xfffffdaf) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000001c0)) chdir(&(0x7f0000000100)='./file0\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x2a) vmsplice(r1, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000300)={0x9e77b1939f3ffc1c, 0x2, 0x1, 0x0, 0x3, 0x0, 0x0, 0x2}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/dev_mcast\x00') sendfile(r3, 0xffffffffffffffff, 0xfffffffffffffffe, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0xc76549796527f5c6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext, 0x20002200b, 0x2, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x2000000009, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='keyring\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x12, 0x1a6273f2b2e289f7, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_TIMESTAMP(r5, 0x1, 0x26, &(0x7f0000000140), 0x0) close(r4) r6 = socket(0x1, 0x800, 0x0) setsockopt(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000d52ff0), 0x0) close(r6) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x200, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@initdev}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0x85) getgroups(0x2, &(0x7f0000000740)=[0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) socket$inet(0x2, 0x3, 0x0) bind$inet(r2, &(0x7f0000000680)={0x2, 0x4e23, @multicast1}, 0x10) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) r9 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendfile(r9, r8, &(0x7f0000000000), 0x1) r10 = socket$unix(0x1, 0x1, 0x0) r11 = dup2(r10, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r11, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@initdev}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0x77) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000600)) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x3f, 0x0) 05:37:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:37:16 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xedc0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r4, r3, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r5, 0x0, 0xedc0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x75) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='selinuxfs\x00', 0xc0ed0000, 0x0) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r8}]]}}}]}, 0x38}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$can_bcm(r5, &(0x7f00000001c0)={&(0x7f0000000080)={0x1d, r8}, 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x3, 0x422, 0x1, {0x0, 0x2710}, {r9, r10/1000+30000}, {0x4, 0x1}, 0x1, @canfd={{0x3, 0x1, 0x0, 0x1}, 0x25, 0x0, 0x0, 0x0, "54942c2251fc76035d0f41378d7c109e1ee2d68fbcfc210804d93bf2c2b8a39798de412e1505016e5b5f755b9df2f66b45c3fe6161b4ccf543bf3834b656971c"}}, 0x80}, 0x1, 0x0, 0x0, 0x40}, 0x1) [ 356.629533] block nbd2: Attempted send on invalid socket [ 356.635064] print_req_error: I/O error, dev nbd2, sector 0 [ 356.643843] F2FS-fs (nbd2): Unable to read 1th superblock 05:37:16 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x126603a, &(0x7f0000000000)={[{@nomblk_io_submit='nomblk_io_submit'}]}) semget(0x0, 0xbc62dd80d326b36d, 0x80) [ 356.681631] block nbd2: Attempted send on invalid socket [ 356.687179] print_req_error: I/O error, dev nbd2, sector 8 [ 356.696095] F2FS-fs (nbd2): Unable to read 2th superblock 05:37:16 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x3, 0x0, &(0x7f0000000140)) r1 = socket$unix(0x1, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x7f, 0x7, 0x42, 0xdf, 0x3, 0x0, 0x7, 0xf9, 0x40, 0x377, 0x8000, 0x20b7, 0x38, 0x2, 0xff, 0x7f, 0x401}, [{0x0, 0x7fff, 0x8, 0x1, 0x1f, 0x2, 0x9, 0xffff}, {0x4, 0x2b, 0x6, 0x0, 0x1, 0x9, 0x4, 0xfffffffffffff76b}], "3aba72d26909041f0413d7a0b60eccbaf8e3c54e9b7b3e46426eca177944fc67fa1ba6c77e0b1d5c952ddfc2b115204e4884ba7739f77bf2b9ffffb2a3d6217017e968e58d1fb8b773867fdbbd1853356696d2eeb9d0ee477045dc29b642ec971e98559dba4e3810145582183e0802fba1dd49e8b23e223a75571706dcd0d8bba883ff", [[], [], [], [], [], [], [], []]}, 0x933) [ 356.752529] block nbd2: Attempted send on invalid socket [ 356.759016] print_req_error: I/O error, dev nbd2, sector 0 [ 356.767182] F2FS-fs (nbd2): Unable to read 1th superblock [ 356.830261] block nbd2: Attempted send on invalid socket [ 356.837696] print_req_error: I/O error, dev nbd2, sector 8 [ 356.843597] F2FS-fs (nbd2): Unable to read 2th superblock 05:37:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:37:16 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xfffffdaf) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000001c0)) chdir(&(0x7f0000000100)='./file0\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x2a) vmsplice(r1, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000300)={0x9e77b1939f3ffc1c, 0x2, 0x1, 0x0, 0x3, 0x0, 0x0, 0x2}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/dev_mcast\x00') sendfile(r3, 0xffffffffffffffff, 0xfffffffffffffffe, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0xc76549796527f5c6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext, 0x20002200b, 0x2, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x2000000009, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='keyring\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x12, 0x1a6273f2b2e289f7, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_TIMESTAMP(r5, 0x1, 0x26, &(0x7f0000000140), 0x0) close(r4) r6 = socket(0x1, 0x800, 0x0) setsockopt(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000d52ff0), 0x0) close(r6) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x200, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@initdev}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0x85) getgroups(0x2, &(0x7f0000000740)=[0x0, 0x0]) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) socket$inet(0x2, 0x3, 0x0) bind$inet(r2, &(0x7f0000000680)={0x2, 0x4e23, @multicast1}, 0x10) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) r9 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendfile(r9, r8, &(0x7f0000000000), 0x1) r10 = socket$unix(0x1, 0x1, 0x0) r11 = dup2(r10, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r11, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@initdev}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0x77) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000600)) syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x3f, 0x0) 05:37:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:16 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') set_mempolicy(0x2, &(0x7f0000000040)=0x5c9, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @rand_addr=0x3}, 0x10) close(r0) sendto$inet(r1, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{0x0}], 0x1, 0x81003) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r5, r4, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r6, 0x0, 0xedc0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r6, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000100)=0x4) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r1, r2, 0x0, 0x102000002) [ 357.131394] block nbd2: Attempted send on invalid socket [ 357.136981] print_req_error: I/O error, dev nbd2, sector 0 [ 357.143410] F2FS-fs (nbd2): Unable to read 1th superblock [ 357.165367] block nbd2: Attempted send on invalid socket [ 357.171095] print_req_error: I/O error, dev nbd2, sector 8 05:37:16 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xedc0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r4, r3, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r5, 0x0, 0xedc0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x75) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='selinuxfs\x00', 0xc0ed0000, 0x0) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r8}]]}}}]}, 0x38}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$can_bcm(r5, &(0x7f00000001c0)={&(0x7f0000000080)={0x1d, r8}, 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x3, 0x422, 0x1, {0x0, 0x2710}, {r9, r10/1000+30000}, {0x4, 0x1}, 0x1, @canfd={{0x3, 0x1, 0x0, 0x1}, 0x25, 0x0, 0x0, 0x0, "54942c2251fc76035d0f41378d7c109e1ee2d68fbcfc210804d93bf2c2b8a39798de412e1505016e5b5f755b9df2f66b45c3fe6161b4ccf543bf3834b656971c"}}, 0x80}, 0x1, 0x0, 0x0, 0x40}, 0x1) [ 357.177818] F2FS-fs (nbd2): Unable to read 2th superblock 05:37:16 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x4, 0x1, 0x4) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000040)) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x5439c268f40ba86a, 0x0) ioctl$KDGKBLED(r2, 0xc0045103, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xd655d3977ded59fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, 0x0, 0x0) getsockopt$bt_BT_POWER(r3, 0x112, 0x4, 0x0, &(0x7f0000004600)=0xfffffcfc) r4 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x80, 0x0) write$P9_RXATTRCREATE(r6, &(0x7f00000000c0)={0x7, 0x21, 0x2}, 0x7) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r7, r5, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r8 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r5, r8, 0x0, 0xedc0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r8, 0x5386, &(0x7f0000000000)) close(r4) 05:37:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:37:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 359.327783] net_ratelimit: 16 callbacks suppressed [ 359.332918] protocol 88fb is buggy, dev hsr_slave_0 [ 359.338022] protocol 88fb is buggy, dev hsr_slave_1 [ 359.495233] audit: type=1400 audit(1574141838.963:4494): avc: denied { map } for pid=13461 comm="syz-executor.3" path="/root/syz-executor.3" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 359.587295] IPVS: ftp: loaded support on port[0] = 21 [ 359.658873] chnl_net:caif_netlink_parms(): no params data found [ 359.692959] bridge0: port 1(bridge_slave_0) entered blocking state [ 359.699583] bridge0: port 1(bridge_slave_0) entered disabled state [ 359.706858] device bridge_slave_0 entered promiscuous mode [ 359.714336] bridge0: port 2(bridge_slave_1) entered blocking state [ 359.720987] bridge0: port 2(bridge_slave_1) entered disabled state [ 359.728521] device bridge_slave_1 entered promiscuous mode [ 359.749062] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 359.760635] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 359.778462] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 359.785987] team0: Port device team_slave_0 added [ 359.792455] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 359.800054] team0: Port device team_slave_1 added [ 359.805661] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 359.814150] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 359.869967] device hsr_slave_0 entered promiscuous mode [ 359.887751] protocol 88fb is buggy, dev hsr_slave_0 [ 359.893001] protocol 88fb is buggy, dev hsr_slave_1 [ 359.918111] device hsr_slave_1 entered promiscuous mode [ 359.958959] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 359.966344] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 359.986729] bridge0: port 2(bridge_slave_1) entered blocking state [ 359.993217] bridge0: port 2(bridge_slave_1) entered forwarding state [ 359.999906] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.006278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 360.051531] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 360.058343] 8021q: adding VLAN 0 to HW filter on device bond0 [ 360.067043] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 360.076579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 360.084094] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.091057] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.098863] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 360.110648] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 360.116894] 8021q: adding VLAN 0 to HW filter on device team0 [ 360.128581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 360.136274] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.142922] bridge0: port 1(bridge_slave_0) entered forwarding state [ 360.154019] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 360.162502] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.168904] bridge0: port 2(bridge_slave_1) entered forwarding state [ 360.188263] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 360.195985] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 360.207326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 360.224600] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 360.234586] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 360.248122] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 360.256237] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 360.265032] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 360.273651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 360.290691] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 360.299441] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 360.306164] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 360.323420] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 360.367732] protocol 88fb is buggy, dev hsr_slave_0 [ 360.372932] protocol 88fb is buggy, dev hsr_slave_1 [ 360.456299] EXT4-fs (sda1): Ignoring removed nomblk_io_submit option [ 360.464780] EXT4-fs (sda1): re-mounted. Opts: nomblk_io_submit, [ 360.487737] protocol 88fb is buggy, dev hsr_slave_0 [ 360.492939] protocol 88fb is buggy, dev hsr_slave_1 [ 360.513406] EXT4-fs (sda1): Ignoring removed nomblk_io_submit option [ 360.527725] protocol 88fb is buggy, dev hsr_slave_0 [ 360.527736] EXT4-fs (sda1): re-mounted. Opts: nomblk_io_submit, [ 360.532845] protocol 88fb is buggy, dev hsr_slave_1 05:37:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, r0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xedc0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000000)=@ccm_128={{0x303}, "6effaf5b6dbc3b20", "c9da699a8d1539ad69f519f1e16b2620", "8eff7163", "908bc72c605cc6dd"}, 0x28) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r4, r3, 0x0) dup2(0xffffffffffffffff, r4) 05:37:20 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x10, 0x2, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x32, 0x0, 0x84003ff) r2 = syz_open_procfs$namespace(0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) gettid() getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, &(0x7f0000000580)) setxattr$trusted_overlay_upper(&(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000700)=ANY=[], 0x0, 0x2) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) pivot_root(0x0, 0x0) semget(0x0, 0x3, 0x102) openat$full(0xffffffffffffff9c, 0x0, 0x240080, 0x0) creat(&(0x7f0000000680)='./file0\x00', 0x0) socket(0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000380)) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 05:37:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:37:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:20 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, r0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xedc0) unlinkat(r2, &(0x7f0000000340)='./file0\x00', 0x0) mkdir(&(0x7f00000001c0)='./bus/file1\x00', 0x0) r3 = creat(&(0x7f0000000040)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x12) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = dup(r4) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r7, r6, 0x0) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r8 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r6, r8, 0x0, 0xedc0) sendmsg$TIPC_NL_PUBL_GET(r8, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x20, 0x0, 0xae8c512d8734bd9b, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000}, 0x20000000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) rename(&(0x7f0000000080)='./bus/file0\x00', &(0x7f0000000140)='./bus/file1\x00') 05:37:20 executing program 4: ioctl$USBDEVFS_BULK(0xffffffffffffffff, 0xc0185502, &(0x7f00000000c0)={{}, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000040)="af"}) syz_read_part_table(0x0, 0xaaaaaaaaaaaac47, &(0x7f0000000080)=[{&(0x7f0000000000)="020181ffffff0a000000ff07000000ffffffa5000800000000000000004000ffffff85000000e1000000887700720030b5829237c30000000000008000da55aa", 0x40, 0x1c0}]) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={r3}, 0x8) r4 = socket$bt_hidp(0x1f, 0x3, 0x6) getsockopt$sock_timeval(r4, 0x1, 0x15, &(0x7f0000000280), &(0x7f00000002c0)=0x10) r5 = syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0x5, 0xafbce8b8eb6afa5a) connect$inet6(r5, &(0x7f0000000340)={0xa, 0x4e20, 0x8, @empty, 0x827}, 0x1c) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f00000003c0)={0x0, {0x2, 0x4e21, @empty}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @empty}, 0x4, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)='tunl0\x00', 0xffffffff, 0x5, 0x800}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000200)={0x4732, 0xa, 0x4, 0x2, r3}, &(0x7f0000000240)=0x10) r6 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r6, 0xc0485630, &(0x7f0000000140)={0x400, "21ac949699832050a0e55fed90d532079e41eb5d13d81f0aa794c6c11b682e04", 0x3, 0x401, 0xfffffffa, 0x40008, 0x2}) [ 360.696306] nbd_handle_cmd: 10 callbacks suppressed [ 360.696323] block nbd2: Attempted send on invalid socket [ 360.707235] print_req_error: 10 callbacks suppressed [ 360.707246] print_req_error: I/O error, dev nbd2, sector 0 [ 360.727512] f2fs_msg: 10 callbacks suppressed [ 360.727544] F2FS-fs (nbd2): Unable to read 1th superblock 05:37:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 360.765162] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 360.791991] block nbd2: Attempted send on invalid socket [ 360.797661] print_req_error: I/O error, dev nbd2, sector 8 [ 360.803985] F2FS-fs (nbd2): Unable to read 2th superblock 05:37:20 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, r0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xedc0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000480)={0x44, r4, 0x31, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x44}}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, r4, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fff}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x43}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xdd3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xf32d074}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$bt_BT_SECURITY(r5, 0x112, 0x4, 0x0, 0x7ffffffff000) [ 360.841654] block nbd2: Attempted send on invalid socket [ 360.847181] print_req_error: I/O error, dev nbd2, sector 0 [ 360.861895] F2FS-fs (nbd2): Unable to read 1th superblock [ 360.887365] block nbd2: Attempted send on invalid socket [ 360.893116] print_req_error: I/O error, dev nbd2, sector 8 [ 360.905416] F2FS-fs (nbd2): Unable to read 2th superblock [ 360.961224] loop4: p1 p2 p3 < > p4 [ 360.979473] netlink: 'syz-executor.0': attribute type 7 has an invalid length. 05:37:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 361.011592] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 361.056870] loop4: p4 size 3657465856 extends beyond EOD, truncated [ 361.152516] block nbd2: Attempted send on invalid socket [ 361.158166] print_req_error: I/O error, dev nbd2, sector 0 [ 361.165272] F2FS-fs (nbd2): Unable to read 1th superblock [ 361.201423] block nbd2: Attempted send on invalid socket [ 361.207309] print_req_error: I/O error, dev nbd2, sector 8 [ 361.215228] F2FS-fs (nbd2): Unable to read 2th superblock 05:37:20 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() open(0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) fchdir(0xffffffffffffffff) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x0, 0x1, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x81}}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, r2) ioctl(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000200)=0x81) umount2(&(0x7f0000000540)='./file0\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x4, 0x0, 0x7}}, 0x28) ioctl$DRM_IOCTL_IRQ_BUSID(r4, 0xc0106403, &(0x7f00000000c0)={0x0, 0xdd, 0x6, 0x9853}) [ 361.259213] block nbd2: Attempted send on invalid socket [ 361.264842] print_req_error: I/O error, dev nbd2, sector 0 [ 361.278179] F2FS-fs (nbd2): Unable to read 1th superblock [ 361.313712] block nbd2: Attempted send on invalid socket [ 361.319661] print_req_error: I/O error, dev nbd2, sector 8 [ 361.326984] F2FS-fs (nbd2): Unable to read 2th superblock 05:37:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:37:21 executing program 3: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, r0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xedc0) accept4$inet(r2, 0x0, &(0x7f0000000000), 0x80800) [ 361.618060] netlink: 'syz-executor.0': attribute type 7 has an invalid length. 05:37:21 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r1 = socket(0x10, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@dev, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000ac0)=0xe8) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000440)='./file0\x00') r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r2, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r3, 0x0, 0x8}, 0xc) socket(0x0, 0x2, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000380)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000940)=[{0x0}, {&(0x7f0000000400)}, {0x0}, {&(0x7f00000005c0)}, {&(0x7f0000000640)}, {&(0x7f0000000780)="24051a71ecfa076ce208296dc2c96d02d387cc95d76162f191365545c1141fba56cb790313e69be881bb3ddf6a2f54aec31b6fb3fd3d314555054556f7c4167dd3363dc0c87aca6b899b95", 0x4b}, {&(0x7f0000000880)="38322ccbca29562c04fc2a22bf19e8b2b6f7a61bf7c5405722341a39a9123aa8ba6465298caef360e0c09330926170c4c73401fa231a82e71c6a342abf88ebf01947", 0x42}], 0x7, 0x0, 0x0, 0x4000047}, 0x0) mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, 0x0) clone(0x3060000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b00000001000"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008000400", @ANYRES32=0x6, @ANYBLOB="880012000c000100697036677265000078000200140007000000000000000000000300000000000114000600fe8800000000000000000000000000011400070054fe55a73990441fd4fcb3fdf488002708001500def60e0008000200a700000008000900030000000400120008000a000000000014000700fe8000000000000000000000000000aa"], 0xb0}}, 0x0) lsetxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:dlm_control_device_t:s0\x00', 0x2a, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socket(0x10, 0x80002, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x28}}, 0x0) mq_open(&(0x7f0000000140)='*\x89-vboxnet1vmnet0,posix_acl_access\x00', 0xd2b0a038b49ed8f2, 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r6, r5, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') [ 361.751549] block nbd2: Attempted send on invalid socket [ 361.757151] print_req_error: I/O error, dev nbd2, sector 0 [ 361.763330] F2FS-fs (nbd2): Unable to read 1th superblock 05:37:21 executing program 0: r0 = memfd_create(&(0x7f0000000300)='\x00\xb3y\xb1\xc4\xc5)\xa3\xc6\x9cjuu\xa1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x20a81) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="0401"]], 0x1}}, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r5, r4, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r6, 0x0, 0xedc0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r6, 0x84, 0xf, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}}, 0x0, 0x339eebf, 0x3, 0x401, 0x6e0b}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000080)={r7, 0x6}, &(0x7f0000000100)=0x8) write$P9_RLINK(r2, &(0x7f0000000280)={0x7}, 0x269) [ 361.841984] block nbd2: Attempted send on invalid socket [ 361.847539] print_req_error: I/O error, dev nbd2, sector 8 [ 361.848085] F2FS-fs (nbd2): Unable to read 2th superblock 05:37:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 361.911604] 9pnet_virtio: no channels available for device 127.0.0.1 05:37:21 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000180)='\x00\xe7', 0xffffffb8, 0x6) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x100, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x2ad) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/$\x00\x00\x00\x00\x00\x80\x00', 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='xfs\x00', 0x0, 0x0) 05:37:21 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:21 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ftruncate(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa90xffffffffffffffff}) vmsplice(r5, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r6 = creat(0x0, 0x0) ftruncate(r6, 0x800fe) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000080)={0x3, {0x3, 0x4, 0x6}, {0x0, 0x4, 0x7f, 0x1}, {0x2, 0xffff}}) ioctl$KDSKBMODE(r6, 0x4b45, &(0x7f0000000200)=0x81) umount2(&(0x7f0000000540)='./file0\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 05:37:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) 05:37:21 executing program 4: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000014000/0x2000)=nil, 0x2000, 0x0, 0x40010, 0xffffffffffffffff, 0x0) ptrace$getsig(0x4202, 0xffffffffffffffff, 0xfffffffffffffffe, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect(r0, &(0x7f00000001c0)=@in={0x2, 0x4e20, @remote}, 0x80) r1 = socket$inet6(0xa, 0x100a, 0xff) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r2, r1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r3, 0x0, 0xedc0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000280)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000e80300002802000008010000280200000801000008010000180300001803000018030000180300001803000004000000", @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e08ed7a10f95d2743e999cc15e03eb8dbc8124e7801c1afd155dc33a26dfdabe8d8bc449b44ad944dbb3b603ee933f77bf4ba98c6bc320d3d29b85dc553e1dc6f9e5fa88eae332728121d0d25f14e3164dd50381a902d96db6d9b5e69f128b8143b2360032d88660d7aab417bf83fb7b028009"], @ANYBLOB="00000000000000000000ffff7f000001fe88000000000000000000000000000100000000ffffffff00000001ffffff007960484800000000ffffff00ffffffff73797a6b616c6c65723100000000000076657468315f746f5f687372000000000000000000000000007f0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000003c00800010000000000000000000000000000000c800080100000000000000000000000000000000000000000000000040004c4f47000000000000000000000000000000000000000000000000000000810220374adf0b3e19c2af4eeb3e075cbc4563d6e5b9d437889e50bfaf66ce3efe8000000000000000000000000000bbff010000000000000000000000000001ff00000000000000000000ff00000000ffffffffff000000ff000000ff0000006272696467655f736c6176655f310000626f6e645f736c6176655f310000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c00040234000000000000000000000000000000f800200100000000000000000000000000000000000000000000000030007372680000000000000000000000000000000000000000000000000000000003693f8000100002000000000000002800434c415353494659000000000000000000000000000000000000000000000500000000000000ff020000000000000000000000000001fe8000000000000000000000000000bb00000000000000ff000000ff000000ff00000000ffffff00000000000000000073797a6b616c6c65723100000000000076657468305f746f5f626f6e64000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000003e40000000000000000000000000000000c800f0000000000000000000000000000000000000000000000000002800434f4e4e5345434d41524b0000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x448) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000d7, 0x0) 05:37:21 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 362.388831] XFS (nbd3): SB validate failed with error -5. 05:37:22 executing program 3: prctl$PR_SET_MM(0x26, 0x4, &(0x7f0000ff9000/0x4000)=nil) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000280)={0x0, 0x70, 0x0, 0x9, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f00000000c0), 0x1}, 0x510, 0x8, 0x6, 0x8, 0x85f, 0x1, 0x2}) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0xfffffff0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r3}]]}}}]}, 0x38}}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r5, r4, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r6, 0x0, 0xedc0) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000080)=0xc) [ 362.502164] syz-executor.1: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 362.599135] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 362.632715] CPU: 1 PID: 13710 Comm: syz-executor.1 Not tainted 4.19.84 #0 [ 362.639705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.649081] Call Trace: [ 362.651798] dump_stack+0x197/0x210 [ 362.655558] warn_alloc.cold+0x7b/0x173 [ 362.659565] ? zone_watermark_ok_safe+0x260/0x260 [ 362.664513] ? lock_downgrade+0x880/0x880 [ 362.668774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 362.674417] ? avc_has_perm+0x404/0x610 [ 362.678459] __vmalloc_node_range+0x486/0x790 [ 362.683020] ? sel_write_load+0x1de/0x470 [ 362.687187] vmalloc+0x6b/0x90 [ 362.690398] ? sel_write_load+0x1de/0x470 [ 362.694568] sel_write_load+0x1de/0x470 [ 362.698760] __vfs_write+0x114/0x810 [ 362.702499] ? perf_trace_lock+0x510/0x510 [ 362.706757] ? sel_make_policy_nodes+0x1520/0x1520 [ 362.711705] ? kernel_read+0x120/0x120 [ 362.715615] ? __lock_is_held+0xb6/0x140 [ 362.719764] ? rcu_read_lock_sched_held+0x110/0x130 [ 362.724798] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 362.729567] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 362.735123] ? __sb_start_write+0x1a9/0x360 [ 362.739466] vfs_write+0x20c/0x560 [ 362.743036] ksys_write+0x14f/0x2d0 05:37:22 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6609) connect$netlink(r0, &(0x7f00000000c0)=@unspec, 0xc) r1 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000300)={0x0, 0x0, [], @raw_data=[0x0, 0x0, 0x0, 0x8001, 0x3, 0x0, 0x0, 0x3, 0x7, 0x20, 0x8, 0x0, 0x80, 0xafce, 0xffffffff, 0x0, 0x3, 0x1, 0x9, 0x0, 0x3, 0x0, 0x0, 0x401, 0x9, 0x9, 0xff, 0x3f, 0xffffffff, 0x2, 0x9, 0x4]}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x54000, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000140)) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x54000, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x54000, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000400)=[@timestamp, @window={0x3, 0xff, 0x3}, @sack_perm, @timestamp, @window={0x3, 0x8, 0x3}, @sack_perm, @timestamp, @window={0x3, 0xffff, 0x3}, @timestamp], 0x9) r4 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x6da3, 0x400080) ioctl$SIOCRSSL2CALL(r4, 0x89e2, &(0x7f0000000200)=@null) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f00000004c0)) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x8e9615741d27eb5f, 0x0) ioctl$PPPIOCGMRU(r5, 0x80047453, &(0x7f0000000040)) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r6, 0x0) write$P9_RWALK(r6, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r7 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x4, 0xfffffff6, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r6, r7) 05:37:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x8, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000040)={0x0, 0xd425}) [ 362.746676] ? __ia32_sys_read+0xb0/0xb0 [ 362.750812] ? do_syscall_64+0x26/0x620 [ 362.754807] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.760181] ? do_syscall_64+0x26/0x620 [ 362.764174] __x64_sys_write+0x73/0xb0 [ 362.768077] do_syscall_64+0xfd/0x620 [ 362.771897] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.777100] RIP: 0033:0x45a639 [ 362.780308] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:37:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x51, 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) dup2(0xffffffffffffffff, r5) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000000280)) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xddd6d07632a73fcb, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000300)={@dev={0xfe, 0x80, [], 0x23}, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1}, 0x20) r8 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r7, r8, &(0x7f0000000240)=0x202, 0x4000000000dc) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') r9 = socket$netlink(0x10, 0x3, 0xf) sendmsg(r9, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)="240000001a0007041dfffd946f610500020000001f00000000000800050016000400ff7e", 0x24}], 0x1}, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r9, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB, @ANYRES16=r6, @ANYBLOB="e5510142cf8b33c4bba137fc071176ffff02ecc7f9f32fc6c544fe5287497378f62e8dbfbfda162c3686ba44093d08825f135d12f7e696ebd25e01c2604a2f50ca876f018a3f472fa6fb000000000000000000000000e5afad3ee2643927d571af1dca15f644830e7bb408395aa76ef137a2bd10bec66e213873777e09f4adac83240000000000000000e7e5"], 0x3}, 0x1, 0x0, 0x0, 0x24008801}, 0x2) r10 = epoll_create1(0x0) close(r10) r11 = syz_open_dev$sndtimer(&(0x7f0000026000)='/dev/snd/timer\x00', 0x0, 0x0) r12 = syz_open_dev$sndtimer(0x0, 0x0, 0x204401) ioctl$SNDRV_TIMER_IOCTL_SELECT(r12, 0x40345410, &(0x7f0000000040)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r11, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_START(r12, 0x54a0) dup3(r11, r12, 0x0) 05:37:22 executing program 2: perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 362.799251] RSP: 002b:00007ff1ca438c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 362.799270] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 [ 362.799278] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 362.799287] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 362.799297] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff1ca4396d4 [ 362.799306] R13: 00000000004cb07b R14: 00000000004e35c0 R15: 00000000ffffffff 05:37:22 executing program 4: madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x801, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f00000000c0), 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r0, r1, 0x0, 0x80000003) mbind(&(0x7f0000c6b000/0x1000)=nil, 0x1000, 0x3, &(0x7f0000000100)=0x1c6, 0x400, 0x3) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000040)={{0x1, 0x0, 0x1ff, 0x1, 0x2c9c0}, 0x40, 0x31c4, 0x7fffffff}) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback, 0x60000000}, 0x1c) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r3, 0x89e4) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r5 = dup3(r3, r4, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r5, 0x29, 0x44, &(0x7f0000000140)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) r6 = dup(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) write$ppp(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000200)=ANY=[@ANYBLOB="0200000008000600000800007ee7020003000000f795606106a6b4b0191531899bff12086d97036277fa27301abb12c033f7165d781fe0150a13e030d6929325ab03189b9b1df9cd7bdcfb06d14b684304119df0c5c4f67e5c3688e329977a8040c64a478524517c5584452722c9ccc8fc05"], 0x14) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0x0, 0x0, 0x0, 0x0, 0xee, &(0x7f0000000480)=""/238, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x0, 0xffffffff, 0x78}, 0x10}, 0x70) signalfd4(r7, 0x0, 0x0, 0x0) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4) [ 362.938283] Mem-Info: [ 362.940925] active_anon:162150 inactive_anon:1485 isolated_anon:0 [ 362.940925] active_file:10256 inactive_file:37577 isolated_file:0 [ 362.940925] unevictable:0 dirty:340 writeback:1 unstable:0 [ 362.940925] slab_reclaimable:13594 slab_unreclaimable:112298 [ 362.940925] mapped:59713 shmem:1546 pagetables:2737 bounce:0 [ 362.940925] free:1189054 free_pcp:444 free_cma:0 05:37:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xb) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) write(r3, &(0x7f000018efdc)="2400000052001f0014f9f407000904000200071010000100feffffff0800000000000000", 0x24) [ 363.036485] Node 0 active_anon:648700kB inactive_anon:5940kB active_file:40876kB inactive_file:150308kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238852kB dirty:1352kB writeback:4kB shmem:6184kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 215040kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 363.086047] Node 1 active_anon:0kB inactive_anon:0kB active_file:148kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:8kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 363.146532] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 05:37:22 executing program 2: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:22 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, r0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, 0x0) getpgrp(r2) r3 = syz_open_procfs(r2, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r3, 0x0, 0xedc0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000140)) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r5, r4, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r6, 0x0, 0xedc0) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r7, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x20, 0x2}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000000100)={r8, 0x7, 0x87, 0x5496c3e1, 0x1000, 0x4}, 0x14) sendmmsg$inet_sctp(r7, &(0x7f0000000700)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000080)="a0", 0x1}], 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="060000000000000084003acf8e8b00000020000000000000"], 0x18}], 0x1, 0x0) [ 363.306792] lowmem_reserve[]: 0 2555 2557 2557 [ 363.319583] Node 0 DMA32 free:953900kB min:36248kB low:45308kB high:54368kB active_anon:649796kB inactive_anon:5940kB active_file:40876kB inactive_file:150308kB unevictable:0kB writepending:1356kB present:3129332kB managed:2619976kB mlocked:0kB kernel_stack:9888kB pagetables:11096kB bounce:0kB free_pcp:1812kB local_pcp:996kB free_cma:0kB [ 363.484748] lowmem_reserve[]: 0 0 2 2 [ 363.529410] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 363.607846] lowmem_reserve[]: 0 0 0 0 [ 363.611860] Node 1 Normal free:3783304kB min:53608kB low:67008kB high:80408kB active_anon:0kB inactive_anon:0kB active_file:148kB inactive_file:0kB unevictable:0kB writepending:8kB present:3932160kB managed:3870180kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 363.643865] lowmem_reserve[]: 0 0 0 0 [ 363.690675] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 363.704920] Node 0 DMA32: 7606*4kB (UME) 5136*8kB (UME) 2694*16kB (UM) 1385*32kB (UME) 844*64kB (UME) 133*128kB (ME) 28*256kB (UME) 12*512kB (UM) 16*1024kB (UME) 8*2048kB (ME) 167*4096kB (M) = 960088kB [ 363.733900] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 363.750414] Node 1 Normal: 72*4kB (UME) 229*8kB (UE) 280*16kB (UME) 56*32kB (UE) 17*64kB (UME) 11*128kB (UE) 6*256kB (UME) 5*512kB (UM) 2*1024kB (M) 1*2048kB (E) 919*4096kB (M) = 3783304kB [ 363.776404] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 363.786294] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 363.795640] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 363.804688] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 363.813430] 49376 total pagecache pages [ 363.817424] 0 pages in swap cache [ 363.821149] Swap cache stats: add 0, delete 0, find 0/0 [ 363.826578] Free swap = 0kB [ 363.829810] Total swap = 0kB [ 363.832916] 1965979 pages RAM [ 363.836069] 0 pages HighMem/MovableOnly 05:37:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) 05:37:23 executing program 0: write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r6, r5, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r8 = socket$inet6(0xa, 0x2, 0x0) r9 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r9, r8, 0x0) connect$inet6(r8, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r10 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r8, r10, 0x0, 0xedc0) getsockopt$inet6_mtu(r8, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) sendfile(r5, r3, 0x0, 0xedc0) ioctl$PPPOEIOCSFWD(r7, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x2, @local, 'eql\x00'}}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xafe}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r11 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r11, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], 0x1}) r12 = socket$inet6(0xa, 0x2, 0x0) r13 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r13, r12, 0x0) connect$inet6(r12, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) sendfile(r12, 0xffffffffffffffff, 0x0, 0xedc0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000480)=""/233) ioctl$KVM_RUN(r11, 0xae80, 0x0) ioctl$KVM_RUN(r11, 0xae80, 0x0) ioctl$KVM_NMI(r11, 0xae9a) ioctl$KVM_SET_REGS(r11, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r11, 0xae80, 0x0) 05:37:23 executing program 2: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:23 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x50, 0x0, 0x0, 0xffeffffe}, {0x80000006}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r3, 0x1, 0x26, &(0x7f0000000040)=0x200, 0x4) connect$inet(r3, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket$pppoe(0x18, 0x1, 0x0) 05:37:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = dup3(r4, r3, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000180)=r5, 0x4) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r8, r6, 0x0) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r9 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r6, r9, 0x0, 0xedc0) ioctl$VIDIOC_G_FBUF(r9, 0x8030560a, &(0x7f0000000140)={0x18d, 0x35, &(0x7f0000000100)="e2f66423b4c17ed6da63f1a9e8121b33ec36", {0x7, 0x7ff, 0xa0363159, 0x0, 0x7, 0xffffffe1, 0x4, 0x9}}) r10 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r10, 0x0, 0xedc0) utimensat(r10, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x0, 0x2710}}, 0x80) connect$inet6(r0, &(0x7f0000000080), 0x1c) shutdown(r0, 0x1) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x4000) 05:37:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffe67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000, 0x0, 0x1}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) socket(0x4, 0x800, 0x20) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x3, 0x4000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0xd0884, 0x0) write$P9_ROPEN(r1, &(0x7f0000000040)={0x32f, 0x71, 0x2, {{0x0, 0x2, 0x3}}}, 0xfffffffffffffe24) sendto$inet(r0, &(0x7f00000005c0)="8b", 0x1, 0xfffffffffffffffd, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005d00)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/148, 0x94}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x10000, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0xeb76) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r4, r3, 0x0) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x1, 0x0) dup3(r4, r5, 0x80000) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000280)='./file0\x00', 0x8, 0x0) [ 363.840172] 338856 pages reserved [ 363.843722] 0 pages cma reserved [ 363.998240] syz-executor.1: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 364.027795] syz-executor.1 cpuset=syz1 mems_allowed=0-1 05:37:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000000001, 0x5}, 0x0, 0x0, 0x0, 0x0, 0xe0ca}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x2, 0x80040) syz_read_part_table(0x5000000, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x14e24, 0x1, @mcast1}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) socket$inet6_sctp(0xa, 0x1, 0x84) [ 364.046187] CPU: 0 PID: 13788 Comm: syz-executor.1 Not tainted 4.19.84 #0 [ 364.053279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.062757] Call Trace: [ 364.065370] dump_stack+0x197/0x210 [ 364.069025] warn_alloc.cold+0x7b/0x173 [ 364.073024] ? zone_watermark_ok_safe+0x260/0x260 [ 364.077895] ? lock_downgrade+0x880/0x880 [ 364.083717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 364.089274] ? avc_has_perm+0x404/0x610 [ 364.093248] __vmalloc_node_range+0x486/0x790 [ 364.097757] ? sel_write_load+0x1de/0x470 [ 364.101909] vmalloc+0x6b/0x90 [ 364.105091] ? sel_write_load+0x1de/0x470 [ 364.109233] sel_write_load+0x1de/0x470 [ 364.113205] __vfs_write+0x114/0x810 [ 364.116929] ? perf_trace_lock+0x510/0x510 [ 364.121176] ? sel_make_policy_nodes+0x1520/0x1520 [ 364.126104] ? kernel_read+0x120/0x120 [ 364.130004] ? __lock_is_held+0xb6/0x140 [ 364.134069] ? rcu_read_lock_sched_held+0x110/0x130 [ 364.139082] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 364.143841] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 364.149381] ? __sb_start_write+0x1a9/0x360 [ 364.153713] vfs_write+0x20c/0x560 [ 364.157272] ksys_write+0x14f/0x2d0 [ 364.160898] ? __ia32_sys_read+0xb0/0xb0 [ 364.164956] ? do_syscall_64+0x26/0x620 [ 364.168941] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 364.174303] ? do_syscall_64+0x26/0x620 [ 364.178278] __x64_sys_write+0x73/0xb0 [ 364.182163] do_syscall_64+0xfd/0x620 [ 364.185964] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 364.191857] RIP: 0033:0x45a639 [ 364.195044] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 364.213981] RSP: 002b:00007ff1ca438c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 364.221691] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 [ 364.228953] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 364.236212] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 05:37:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0xfb) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000000c0)=0x6, 0x1e) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @rand_addr="0900812c6a278f0d7de07a937a134ac6", @mcast1, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2, 0x3}}}}}}}, 0x0) 05:37:23 executing program 2: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 364.243473] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff1ca4396d4 [ 364.250733] R13: 00000000004cb07b R14: 00000000004e35c0 R15: 00000000ffffffff [ 364.275996] Mem-Info: [ 364.279842] active_anon:162651 inactive_anon:1482 isolated_anon:0 [ 364.279842] active_file:10258 inactive_file:37582 isolated_file:0 [ 364.279842] unevictable:0 dirty:341 writeback:0 unstable:0 [ 364.279842] slab_reclaimable:13623 slab_unreclaimable:112767 [ 364.279842] mapped:59725 shmem:1546 pagetables:2731 bounce:0 [ 364.279842] free:1188144 free_pcp:443 free_cma:0 05:37:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0xa, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x54}}, &(0x7f0000281ffc)='G\xffL\x00', 0x1000000, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x80000008}, 0x10}, 0x70) syz_open_dev$char_usb(0xc, 0xb4, 0x3) [ 364.503644] Node 0 active_anon:663612kB inactive_anon:5928kB active_file:40884kB inactive_file:150328kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:239200kB dirty:1356kB writeback:0kB shmem:6184kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 208896kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 05:37:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 364.570889] Node 1 active_anon:0kB inactive_anon:0kB active_file:148kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:8kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 05:37:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480022fc0f00050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000200fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747c7bc105c67b60d4fed4fcff4d7e852ee9b3ce469c2a538e65fc910c45b3fd3da82f607cd843cdb0f5f75ae7c95ac37a1b58263c7a00cab5aa8b3400000"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0xfce0, 0xa, 0x10}]}, 0x28}}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) dup3(r4, r2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0xa, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x18c, &(0x7f0000000180)={0x0, 0x182}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@ipv4_getnetconf={0x1c, 0x52, 0x100, 0x70bd2a, 0x25dfd9ff, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x650}]}, 0x1c}}, 0x0) [ 364.677878] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 364.704335] net_ratelimit: 24 callbacks suppressed [ 364.704343] protocol 88fb is buggy, dev hsr_slave_0 [ 364.704412] protocol 88fb is buggy, dev hsr_slave_1 [ 364.704537] protocol 88fb is buggy, dev hsr_slave_0 [ 364.704588] protocol 88fb is buggy, dev hsr_slave_1 [ 364.783661] lowmem_reserve[]: 0 2555 2557 2557 [ 364.788624] Node 0 DMA32 free:951620kB min:36248kB low:45308kB high:54368kB active_anon:651392kB inactive_anon:5924kB active_file:40888kB inactive_file:150360kB unevictable:0kB writepending:1360kB present:3129332kB managed:2619976kB mlocked:0kB kernel_stack:9664kB pagetables:10932kB bounce:0kB free_pcp:1904kB local_pcp:1296kB free_cma:0kB [ 364.819764] lowmem_reserve[]: 0 0 2 2 [ 364.824582] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 364.857767] protocol 88fb is buggy, dev hsr_slave_0 [ 364.862998] protocol 88fb is buggy, dev hsr_slave_1 [ 364.868658] selinux_nlmsg_perm: 30 callbacks suppressed [ 364.868675] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=13830 comm=syz-executor.3 [ 364.868936] lowmem_reserve[]: [ 364.880991] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 364.888675] 0 [ 364.931909] 0 0 0 [ 364.934235] Node 1 Normal free:3783304kB min:53608kB low:67008kB high:80408kB active_anon:0kB inactive_anon:0kB active_file:148kB inactive_file:0kB unevictable:0kB writepending:8kB present:3932160kB managed:3870180kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 364.959196] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 364.963100] lowmem_reserve[]: 0 0 0 0 [ 364.974815] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 364.989137] Node 0 DMA32: 6221*4kB (UME) 4898*8kB (ME) 2682*16kB (UME) 1409*32kB (UME) 844*64kB (UME) 133*128kB (ME) 27*256kB (ME) 11*512kB (UM) 16*1024kB (UME) 9*2048kB (ME) 166*4096kB (M) = 950404kB [ 365.007533] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 365.020128] Node 1 Normal: 72*4kB (UME) 229*8kB (UE) 280*16kB (UME) 56*32kB (UE) 17*64kB (UME) 11*128kB (UE) 6*256kB (UME) 5*512kB (UM) 2*1024kB (M) 1*2048kB (E) 919*4096kB (M) = 3783304kB [ 365.037507] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 365.048798] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 365.057547] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 365.067758] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 05:37:24 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000580)={{&(0x7f0000e00000/0x200000)=nil, 0x200000}, 0x2}) mkdir(&(0x7f0000000000)='./file0\x00', 0x44) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r3, r2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r4, 0x0, 0xedc0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r7 = syz_open_dev$dspn(&(0x7f0000000480)='/dev/dsp#\x00', 0x7fff, 0x101000) recvfrom$inet(r7, &(0x7f00000004c0)=""/70, 0x46, 0x2, &(0x7f0000000540)={0x2, 0x4e21, @empty}, 0x10) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000280)={0xffffffffffffffff}, 0x0, r6, 0x1c, 0x0, @ib={0x1b, 0x7fff, 0x401, {"3050dfdb09c5c79d1f7c98398a57d933"}, 0x7de72ca6}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000400)={0x11, 0x10, 0xfa00, {&(0x7f0000000200), r8}}, 0x18) setsockopt(r0, 0xe97c, 0x0, &(0x7f00000002c0)="f72b5f7973abf6931faf178a4e40e894b4cffe30784d2c16c6a7c603fe7aba544426f9c4044b3457574cec7af70625e68907f839483e3a6f7f835ba616701bf08d0334a239119c3a1c6b03f2b1a4b73591e9de99", 0x54) r9 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x2, 0x6, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$kcm(0xa, 0x2, 0x73) renameat2(r9, &(0x7f0000000080)='./file0\x00', r9, &(0x7f0000000240)='./file0\x00', 0x3) r10 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r10, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) 05:37:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) 05:37:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r4, r3, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r5, 0x0, 0xedc0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r7, r6, 0x0) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r8 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r6, r8, 0x0, 0xedc0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r8) r9 = dup3(r0, r1, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000240)={0x1, 0x0, [{0x80000001, 0x0, 0x0, 0x0, 0xffffffff}]}) r10 = socket$inet6(0xa, 0x2, 0x0) r11 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r11, r10, 0x0) connect$inet6(r10, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r12 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r10, r12, 0x0, 0xedc0) r13 = socket$inet6(0xa, 0x2, 0x0) r14 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r14, r13, 0x0) connect$inet6(r13, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r15 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r13, r15, 0x0, 0xedc0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r13, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0xac, "c26de5482c45c297499175744fe78a3ddf44a23aef04a1ce855a760f47d0991026e6abee4306058bc8da9f3c0dfa5db9be84874ff1401a0df07c1bff995615e82809b7b0defb942e90560072271c7957e9a09376e41ccc21f7443ca68ac30742890aa6fa9d01844eef4259f5bfd9e881b6bc9926554b4cc761436d5eb5246653a5986c646269ee0ced1b2c6acd73b5cd6f865200bba28ba25d6eff17c9df550c3dd2847a55c2c60b28d38280"}, &(0x7f0000000100)=0xb4) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r10, 0x84, 0x76, &(0x7f0000000140)={r16, 0x3f80000}, &(0x7f0000000180)=0x8) dup2(r9, r2) 05:37:24 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, r0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xedc0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000480)={0x44, r4, 0x31, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x44}}, 0x0) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x432100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x20, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x1c}}, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r6 = socket$caif_stream(0x25, 0x1, 0x0) dup2(r5, r6) 05:37:24 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) fchdir(0xffffffffffffffff) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7fff00000000, 0x803) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000100)=""/36) socket$inet6(0xa, 0x400000000001, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0xff, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4000000000000}, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8000000000006000, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x600) sendfile(r1, r2, 0x0, 0x10000) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r4, 0x0) r5 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7, 0xb8efd4050c12aeb) r6 = creat(&(0x7f0000000180)='./file0\x00', 0x20) ioctl$VHOST_SET_VRING_CALL(r5, 0x4008af21, &(0x7f00000001c0)={0x1, r6}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB], 0x0) msgget$private(0x0, 0x0) [ 365.086569] 49385 total pagecache pages [ 365.093726] 0 pages in swap cache [ 365.097244] Swap cache stats: add 0, delete 0, find 0/0 [ 365.102695] Free swap = 0kB [ 365.105709] Total swap = 0kB [ 365.108829] 1965979 pages RAM [ 365.111940] 0 pages HighMem/MovableOnly [ 365.115918] 338856 pages reserved [ 365.119474] 0 pages cma reserved [ 365.197177] audit: type=1804 audit(1574141844.663:4495): pid=13849 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir352349009/syzkaller.tcYUQY/9/file0" dev="sda1" ino=17174 res=1 05:37:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, r0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xedc0) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000000)={0x3, 0xf7, &(0x7f0000000380)="09f9bd2055e6b2b687f6ff6ae81daa73ad0be3376db62726121d415eb40e1cac4e6d3b19fb1060400faae3ffc340100605adbaa62e43d786ea6a0d7e135680a970fa7978ecbfbb1b9d51583305e6125afbff255ec413e4bd67ed0e57ec74068f31c3edea848e41f0d3e8b21513ebfd9e32f76869d0d25579a28a29b4e4dcf9a744856ed1f5469047c41734a608ae173e01788f72ecc4e176a5d86c52e852e90e8060a31c3d8d444962069cffcf6dd6436a58b65e9a81691c61b6cecb8efac661ae53642969c0d5024a446b89ba1600ad88d8170e90bceb191f4335341191b2de0853d7e92635b42214865a147a87db9a0c88b7f58dd7c5"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000600900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 365.312602] netlink: 'syz-executor.4': attribute type 7 has an invalid length. [ 365.327645] bridge0: port 3(gretap0) entered disabled state [ 365.334957] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.346512] bridge0: port 1(bridge_slave_0) entered disabled state 05:37:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 365.383266] audit: type=1800 audit(1574141844.663:4496): pid=13849 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17174 res=0 [ 365.407729] protocol 88fb is buggy, dev hsr_slave_0 [ 365.412874] protocol 88fb is buggy, dev hsr_slave_1 [ 365.451518] device bridge0 left promiscuous mode [ 365.567398] audit: type=1400 audit(1574141844.703:4497): avc: denied { setopt } for pid=13840 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 365.597732] protocol 88fb is buggy, dev hsr_slave_0 [ 365.603018] protocol 88fb is buggy, dev hsr_slave_1 [ 365.666184] audit: type=1804 audit(1574141844.753:4498): pid=13856 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir352349009/syzkaller.tcYUQY/9/file0" dev="sda1" ino=17174 res=1 [ 365.733780] f2fs_msg: 19 callbacks suppressed [ 365.733815] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 365.745156] audit: type=1800 audit(1574141844.763:4499): pid=13849 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17174 res=0 [ 365.773269] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 05:37:25 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r3, r2, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r5 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={r7}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000100)={r7}, 0x8) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r8 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r8, 0x0, 0xedc0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f0000000780)=ANY=[@ANYBLOB="919561a56294c1b5a86f62e3cc6924e4aad213514f9beb26902bd4412752e5bf40d1723467dbd69446c6744e06dfce4b1af33a2dc8f74f291a67c82730337c28128c", @ANYBLOB="b430baca56870e7dc332fc1ab58f62d85dc22e3601f682b199857b88c8bfad6356f806959f358a58851e1b2b9ecf3e589f889dce978d4f975b805f5d04d6346aefabe1a3f153f55b8317df6e3d18c5482e998b4994ad13ad4bbbd5170b79efbe168443d409777c9c163b77d02660a881ce6a10f578cff4aa55b240efc0", @ANYRES16, @ANYRES32=r0, @ANYRES16, @ANYRESHEX=r0, @ANYPTR=&(0x7f0000000180)=ANY=[@ANYRES16=r8, @ANYBLOB="6bb6ec2c439bd01951e33d97ecbcb83acabeced9c65fc45218579ae3618d9cd527e44e5967ddb836ca4586e4826707c4524cf8869a5e06d2e1dc94a2091432a723b10d61ff88d4e2e10d8fbcd0a5ba5b7aab6b76cda3eb89004a4252119dfa7e296bf50fe9ce36d7818fd0815fc62d1922c78ec783118fd8920f7ca576f2d43aa8df1b321acc083bac21558fec41994e0a8dcd7894bf7a7f"], @ANYRES32]], 0x184) r9 = dup(r1) write$FUSE_NOTIFY_RETRIEVE(r9, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 05:37:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 365.792005] F2FS-fs (loop3): invalid crc value [ 365.811696] F2FS-fs (loop3): invalid crc value [ 365.827289] F2FS-fs (loop3): Failed to get valid F2FS checkpoint [ 365.866229] audit: type=1804 audit(1574141844.763:4500): pid=13849 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir352349009/syzkaller.tcYUQY/9/file0" dev="sda1" ino=17174 res=1 [ 366.023004] nbd_handle_cmd: 15 callbacks suppressed [ 366.023021] block nbd2: Attempted send on invalid socket [ 366.033646] print_req_error: 15 callbacks suppressed [ 366.033656] print_req_error: I/O error, dev nbd2, sector 0 [ 366.047084] F2FS-fs (nbd2): Unable to read 1th superblock [ 366.054024] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 366.068471] block nbd2: Attempted send on invalid socket [ 366.074077] print_req_error: I/O error, dev nbd2, sector 8 [ 366.080400] F2FS-fs (nbd2): Unable to read 2th superblock [ 366.095923] block nbd2: Attempted send on invalid socket [ 366.098253] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 366.101553] print_req_error: I/O error, dev nbd2, sector 0 [ 366.115355] F2FS-fs (nbd2): Unable to read 1th superblock 05:37:25 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r3, r2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r4, 0x0, 0xedc0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000140), &(0x7f0000000180)=0x4) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000001c0)='./bus\x00') r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r5, &(0x7f00000002c0)=ANY=[@ANYBLOB="384598eadfb0aca121e1392aa17b7e01986d125491333cfc327600051a2df43448b287f5552d175d56d1e14b680992aa432e179ef732326752fc53d235b8fbf1ba83c49810f547459b33bdb537fa30b84e5d835711b199c729161d434b6218d4ad572b630efc36999df5864381d1b9f68270c22ded9e3d2bfbb062f4975bf6cd9d31dde9c7c9237b35a8929c5c"], 0x101) [ 366.167912] block nbd2: Attempted send on invalid socket [ 366.173492] print_req_error: I/O error, dev nbd2, sector 8 05:37:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000580)={{&(0x7f0000e00000/0x200000)=nil, 0x200000}, 0x2}) mkdir(&(0x7f0000000000)='./file0\x00', 0x44) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r3, r2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r4, 0x0, 0xedc0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r7 = syz_open_dev$dspn(&(0x7f0000000480)='/dev/dsp#\x00', 0x7fff, 0x101000) recvfrom$inet(r7, &(0x7f00000004c0)=""/70, 0x46, 0x2, &(0x7f0000000540)={0x2, 0x4e21, @empty}, 0x10) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000280)={0xffffffffffffffff}, 0x0, r6, 0x1c, 0x0, @ib={0x1b, 0x7fff, 0x401, {"3050dfdb09c5c79d1f7c98398a57d933"}, 0x7de72ca6}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000400)={0x11, 0x10, 0xfa00, {&(0x7f0000000200), r8}}, 0x18) setsockopt(r0, 0xe97c, 0x0, &(0x7f00000002c0)="f72b5f7973abf6931faf178a4e40e894b4cffe30784d2c16c6a7c603fe7aba544426f9c4044b3457574cec7af70625e68907f839483e3a6f7f835ba616701bf08d0334a239119c3a1c6b03f2b1a4b73591e9de99", 0x54) r9 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x2, 0x6, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$kcm(0xa, 0x2, 0x73) renameat2(r9, &(0x7f0000000080)='./file0\x00', r9, &(0x7f0000000240)='./file0\x00', 0x3) r10 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r10, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) 05:37:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[], 0x0) [ 366.430305] netlink: 'syz-executor.4': attribute type 7 has an invalid length. 05:37:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 366.514234] overlayfs: './bus' not a directory 05:37:26 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x10000000000009, &(0x7f0000000180), 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0) getpid() recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_hwaddr=@random="e02dcf12b367"}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000180)={@remote, 0x27}) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {0x0}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}], 0x5, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x458200) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, r1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 366.631840] syz-executor.1: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 366.657038] block nbd2: Attempted send on invalid socket [ 366.663232] print_req_error: I/O error, dev nbd2, sector 0 [ 366.670362] block nbd2: Attempted send on invalid socket [ 366.675893] print_req_error: I/O error, dev nbd2, sector 8 [ 366.683473] block nbd2: Attempted send on invalid socket [ 366.689628] print_req_error: I/O error, dev nbd2, sector 0 [ 366.702638] block nbd2: Attempted send on invalid socket [ 366.708326] print_req_error: I/O error, dev nbd2, sector 8 [ 366.736367] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 366.763310] CPU: 1 PID: 14003 Comm: syz-executor.1 Not tainted 4.19.84 #0 [ 366.770306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.779682] Call Trace: [ 366.782297] dump_stack+0x197/0x210 [ 366.785954] warn_alloc.cold+0x7b/0x173 [ 366.789953] ? zone_watermark_ok_safe+0x260/0x260 [ 366.794820] ? lock_downgrade+0x880/0x880 [ 366.798996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 366.804549] ? avc_has_perm+0x404/0x610 [ 366.808554] __vmalloc_node_range+0x486/0x790 [ 366.813076] ? sel_write_load+0x1de/0x470 [ 366.817243] vmalloc+0x6b/0x90 [ 366.820450] ? sel_write_load+0x1de/0x470 [ 366.824617] sel_write_load+0x1de/0x470 [ 366.828612] __vfs_write+0x114/0x810 [ 366.832347] ? perf_trace_lock+0x510/0x510 [ 366.836594] ? sel_make_policy_nodes+0x1520/0x1520 [ 366.841538] ? kernel_read+0x120/0x120 [ 366.845448] ? __lock_is_held+0xb6/0x140 [ 366.849541] ? rcu_read_lock_sched_held+0x110/0x130 [ 366.854581] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 366.859368] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 366.864929] ? __sb_start_write+0x1a9/0x360 [ 366.869271] vfs_write+0x20c/0x560 [ 366.872829] ksys_write+0x14f/0x2d0 [ 366.876477] ? __ia32_sys_read+0xb0/0xb0 [ 366.880559] ? do_syscall_64+0x26/0x620 [ 366.884578] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 366.889954] ? do_syscall_64+0x26/0x620 [ 366.893952] __x64_sys_write+0x73/0xb0 [ 366.897863] do_syscall_64+0xfd/0x620 [ 366.901687] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 366.906884] RIP: 0033:0x45a639 [ 366.910089] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 366.929034] RSP: 002b:00007ff1ca438c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 366.936786] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 [ 366.944071] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 366.951421] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 366.958707] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff1ca4396d4 [ 366.965993] R13: 00000000004cb07b R14: 00000000004e35c0 R15: 00000000ffffffff [ 366.978666] Mem-Info: 05:37:26 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000100)={0x1, @vbi={0x0, 0x0, 0x56595559}}) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r2, r1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r3, 0x0, 0xedc0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r3, 0xc040564b, &(0x7f0000000000)={0xe6e, 0x0, 0x2009, 0x8, 0x8, {0x1, 0x7fffffff}, 0x1}) [ 367.008320] active_anon:168290 inactive_anon:1485 isolated_anon:0 [ 367.008320] active_file:10262 inactive_file:37602 isolated_file:0 [ 367.008320] unevictable:0 dirty:346 writeback:0 unstable:0 [ 367.008320] slab_reclaimable:13694 slab_unreclaimable:112732 [ 367.008320] mapped:59713 shmem:1546 pagetables:2713 bounce:0 [ 367.008320] free:1182398 free_pcp:534 free_cma:0 [ 367.187857] Node 0 active_anon:677360kB inactive_anon:5940kB active_file:40900kB inactive_file:150408kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238852kB dirty:1376kB writeback:0kB shmem:6184kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 217088kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 05:37:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:26 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) getpgrp(r1) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000040)={{0x3, 0x61b860172de516a0, 0x4, 0x200, 'syz1\x00', 0x4}, 0x2, 0x10a414627f362931, 0x1, r1, 0x2, 0x4, 'syz1\x00', &(0x7f0000000000)=['/dev/snd/seq\x00', 'queue0\x00'], 0x14, [], [0x4, 0x5, 0x5, 0x401]}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000380)) [ 367.262986] Node 1 active_anon:0kB inactive_anon:0kB active_file:148kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:8kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 367.358251] vim2m vim2m.0: Fourcc format (0x56595559) invalid. [ 367.439723] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 367.441398] vim2m vim2m.0: Fourcc format (0x56595559) invalid. 05:37:26 executing program 5: r0 = dup(0xffffffffffffffff) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x8800, 0x0, 0x0, 0x0, 0x4, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80000, 0x0) close(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) epoll_create1(0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000080)) dup3(0xffffffffffffffff, r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) fcntl$setlease(r3, 0x400, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000000c0)=0x11) r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x388d9002d3f09e43) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r5, &(0x7f0000000080)) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'ip6erspan0\x00'}}) 05:37:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 367.490634] lowmem_reserve[]: 0 2555 2557 2557 [ 367.508372] Node 0 DMA32 free:917740kB min:36248kB low:45308kB high:54368kB active_anon:685036kB inactive_anon:5940kB active_file:40900kB inactive_file:150408kB unevictable:0kB writepending:1376kB present:3129332kB managed:2619976kB mlocked:0kB kernel_stack:9664kB pagetables:11000kB bounce:0kB free_pcp:2460kB local_pcp:1408kB free_cma:0kB [ 367.578070] lowmem_reserve[]: 0 0 2 2 [ 367.588236] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 367.659273] block nbd2: Attempted send on invalid socket [ 367.664876] print_req_error: I/O error, dev nbd2, sector 0 [ 367.671352] block nbd2: Attempted send on invalid socket [ 367.676976] print_req_error: I/O error, dev nbd2, sector 8 [ 367.735169] lowmem_reserve[]: 0 0 0 0 05:37:27 executing program 0: getpid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x40000, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000001c0)={0x1, 'irlan0\x00', 0x2}, 0x18) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x4804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x3}, 0x10000, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x1000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) prctl$PR_SET_MM(0x23, 0x3, &(0x7f0000ffe000/0x1000)=nil) syz_init_net_socket$ax25(0x3, 0x2, 0xcf) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) open(&(0x7f0000000080)='./bus\x00', 0x101000, 0x8) creat(&(0x7f00000000c0)='./bus\x00', 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 367.769294] Node 1 Normal free:3783304kB min:53608kB low:67008kB high:80408kB active_anon:0kB inactive_anon:0kB active_file:148kB inactive_file:0kB unevictable:0kB writepending:8kB present:3932160kB managed:3870180kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 05:37:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 367.847779] lowmem_reserve[]: 0 0 0 0 [ 367.851835] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 367.980200] audit: type=1804 audit(1574141847.453:4501): pid=14051 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir236754625/syzkaller.omzjAi/184/bus" dev="sda1" ino=17197 res=1 [ 367.996245] Node 0 DMA32: 778*4kB (U) 640*8kB (ME) 2666*16kB (UME) 1432*32kB (UME) 847*64kB (UME) 133*128kB (ME) 27*256kB (ME) 10*512kB (UM) 16*1024kB (UME) 5*2048kB (ME) 167*4096kB (M) = 890632kB [ 368.026364] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 368.038532] Node 1 Normal: 72*4kB (UME) 229*8kB (UE) 280*16kB (UME) 56*32kB (UE) 17*64kB (UME) 11*128kB (UE) 6*256kB (UME) 5*512kB (UM) 2*1024kB (M) 1*2048kB (E) 919*4096kB (M) = 3783304kB [ 368.068116] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 05:37:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 368.073057] audit: type=1804 audit(1574141847.453:4502): pid=14051 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir236754625/syzkaller.omzjAi/184/bus" dev="sda1" ino=17197 res=1 [ 368.091533] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 05:37:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000480)={'filter\x00', 0x7, 0x4, 0x4a0, 0x0, 0x0, 0x0, 0x3b8, 0x3b8, 0x3b8, 0x4, &(0x7f0000000140), {[{{@arp={@broadcast, @multicast1, 0xff000000, 0xff000000, @mac=@dev={[], 0xe}, {[0xff, 0x0, 0xff, 0x0, 0xff]}, @mac=@remote, {[0x0, 0xcb548d6cfc65d1ff, 0xff, 0x80, 0xff]}, 0x3f, 0x9, 0x80, 0x1, 0x4, 0x4, 'veth1_to_team\x00', 'ip6gre0\x00', {0xff}, {}, 0x0, 0x400}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @mac=@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x4, 0xf, 0x1}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0xf, 0xffffffff}}}, {{@uncond, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0x5, 0x4}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000000000001b000000000008000a000f000000"], 0x30}}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r4, r3, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r5, 0x0, 0xedc0) r6 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000200)=[@in={0x2, 0x4e24, @local}, @in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e23, 0x9, @empty, 0x1000}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e22, 0x48cb, @rand_addr="392e1e91c1c58883f8e87318308a7925", 0x8001}, @in={0x2, 0x4e20, @broadcast}], 0xfffffd03) connect$inet6(r6, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={r8}, 0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000040)={r8, 0x8001, 0x10, 0x800800, 0x80000001}, &(0x7f0000000080)=0xffcf) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000000c0)={r9, 0x6}, &(0x7f0000000100)=0x8) [ 368.166345] audit: type=1804 audit(1574141847.483:4503): pid=14054 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir236754625/syzkaller.omzjAi/184/bus" dev="sda1" ino=17197 res=1 [ 368.192230] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 368.257754] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 368.277351] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 368.291199] 49414 total pagecache pages [ 368.295303] 0 pages in swap cache [ 368.303344] Swap cache stats: add 0, delete 0, find 0/0 [ 368.315777] Free swap = 0kB [ 368.323887] Total swap = 0kB [ 368.331800] 1965979 pages RAM [ 368.339772] 0 pages HighMem/MovableOnly [ 368.349363] 338856 pages reserved [ 368.354988] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 368.364536] 0 pages cma reserved 05:37:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[], 0x0) 05:37:27 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x81, 0x1240) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r4, r3, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r5, 0x0, 0xedc0) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r7 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000140)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r6, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x14, r7, 0x0, 0x70bd26, 0x25dfdbff, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x3efd57b8df2f4ad5}, 0x4) sendmsg$NET_DM_CMD_STOP(r5, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x21400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r7, 0x300, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000020}, 0x8000) sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5b29}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x34}}, 0x400c014) r8 = perf_event_open(&(0x7f0000000940)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0xc084c1e989a95ee3, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000180)='cpu\t>-6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x1) 05:37:27 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0xd1, 0x2, 0x0, 0x0, 0x3}, 0x0) inotify_init() ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r2, r1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r3, 0x0, 0xedc0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x1) r4 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r4, 0x2287, 0x0) ioctl$RNDADDTOENTCNT(r4, 0x40045201, 0x0) r5 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r5, 0x2287, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ppoll(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000240)={0x5}, 0x8) socket$inet6(0xa, 0x400000000001, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r7 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r6, &(0x7f0000001400)="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", 0x107) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs={0xc6b38d19565f0ca8, 0x0, 0x4e23}, 0x6e) sendfile(r6, r7, 0x0, 0x10000) 05:37:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r3, r2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r4, 0x0, 0xedc0) ioctl$KIOCSOUND(r4, 0x4b2f, 0x1) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00000000008433df6d6f6b577d4eaaf2000007"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='security.evm\x00', &(0x7f0000000440)=@sha1={0x1, "886a8688dec42a21b936481dc7cb99810e551dd9"}, 0x15, 0x1) sendmsg$nl_route_sched(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32=r6, @ANYBLOB="0008008000000000030000000800010075333200580002001400040020000000000000000000000000000000400006003c000100000000000000fd1f898dde66057433b6ef3a41d22be225e0001b00000000000000000000000000000000000000000084e1a912c5998bcbf050000000000000000000000000000000798a3c067277da1a290b9613a33c575c36fad473382c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab3194534ba4e973684b27793bff837d3"], 0x84}}, 0x0) 05:37:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[], 0x0) [ 369.460257] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 05:37:29 executing program 4: r0 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x2, 0x4) syz_emit_ethernet(0x3b, &(0x7f00000001c0)={@link_local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x19, 0x0, [], "1a10205cd2d22d1f1dba8296b4955a2ee3"}}}}}, 0x0) 05:37:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:29 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x1, &(0x7f0000001fd8)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}], &(0x7f0000003ff6)='OPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 369.737800] net_ratelimit: 21 callbacks suppressed [ 369.737809] protocol 88fb is buggy, dev hsr_slave_0 [ 369.747945] protocol 88fb is buggy, dev hsr_slave_1 05:37:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:29 executing program 0: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, 0x0) getpriority(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x600) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r0 = gettid() connect$caif(0xffffffffffffffff, &(0x7f0000000540)=@rfm={0x25, 0xa9c4, "0457a8665d6a009a692e58efbe124722"}, 0x18) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_int(r1, 0x84, 0x0, 0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_TRY_FMT(r2, 0xc0d05605, &(0x7f00000002c0)={0xb, @win={{0x38305343}, 0x0, 0x0, 0x0, 0x0, 0x0}}) ioctl$TIOCMBIC(r2, 0x5417, &(0x7f0000000080)) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCSPGRP(r1, 0x8902, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000200)={0x7ff, 0x0, 0x80000002}, 0x10) r3 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_TRY_FMT(r3, 0xc0d05605, &(0x7f00000002c0)={0xb, @win={{0x38305343}, 0x0, 0x0, 0x0, 0x0, 0x0}}) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') r5 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r5, 0x65, 0x10000000005, &(0x7f0000000000)="e1affde3", 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) sendmsg$can_raw(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x1d, r6}, 0x10, &(0x7f00000001c0)={&(0x7f0000000200)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "fb28676f2455f823301f7aea807c513c6bdb5aa5dc91c25388f82bb61f3c7e15762a97288dc53917d530b684eb077bff39d4472f26f18ad4ffad2f00"}, 0x48}}, 0x0) r7 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r7, 0x65, 0x10000000005, &(0x7f0000000000)="e1affde3", 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) sendmsg$can_raw(r7, &(0x7f0000000180)={&(0x7f0000000080)={0x1d, r8}, 0x10, &(0x7f00000001c0)={&(0x7f0000000400)=@canfd={{0x3, 0x1, 0x0, 0x1}, 0x1b, 0x0, 0x0, 0x0, "8e72aaa15eaf428c4fbeacbd654c21d1f4ef6fee0221e23a93ce8804a94c428c1891f3ebd958da9f611d64fd6cfb6bb7a722892234e558f54be6ea0418ae6587"}, 0x48}, 0x1, 0x0, 0x0, 0x2000800}, 0x0) r9 = syz_open_dev$swradio(0x0, 0x1, 0x2) ioctl$VIDIOC_TRY_FMT(r9, 0xc0d05605, &(0x7f00000002c0)={0xb, @win={{0x38305343}, 0x0, 0x0, 0x0, 0x0, 0x0}}) r10 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x100, 0x0) sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="000200006b5c649461f0788863ac07d974517bc52dea5d1e5a7b8de5157adb02aa257c1c6b23c5d5e1aed15c1254b165c8f36ebff488908935fa348f4502ce97d439d538219b589500659af13cd536a70e6dcd5067455b22076d1c0bf0e5fa0ae457bdb2d97e4a881060a75b6d006b65c568ab4caf119a7bf2c0a64366dbeb3fe79ba561398495ed1ee9ffeb908974828b9b25c4c8bcf8056a61d5045a49880eae000000000000000000", @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRES32=r0, @ANYPTR], @ANYRES64=r7], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000180)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x6480430}, 0xc, &(0x7f0000000140)={&(0x7f0000000700)=ANY=[@ANYRESHEX, @ANYRES16=r4, @ANYBLOB="00002bbd7000fddbdf25110001040000060019050000500001a3dd00060073680000080001000a0000000c000700300000000000000014000300ac1414bb000000000000000000000000d7080b007369700014000300e00000020000001bfb003b00000000000800040008000000680001000c0007000100000002000000080002005e00de00000000000056f900080006006c63000008000b00736970000800060073656400080004004e2400000c00070034a0ca57100000000800"], 0x3}, 0x1, 0x0, 0x0, 0x44}, 0x20048d50) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) [ 370.205283] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 05:37:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) 05:37:29 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r0, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) userfaultfd(0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r2, r1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r3, 0x0, 0xedc0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f0000000340)={0x2}) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x2, &(0x7f00000000c0), 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4\x02\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r4, &(0x7f0000000080)=0x1a001b00, 0x297ef) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000001880)='cgroup.type\x00', 0x2, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000080)='memory.high\x00', 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000200)='/dev/snd/midiC#D#\x00', 0x1ff, 0x200800) socket$inet6(0xa, 0x0, 0x0) syz_open_dev$radio(0x0, 0x2, 0x2) r7 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x4, 0x101000) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r8, 0xc08c5334, &(0x7f0000000200)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000740)={0x0, r8, 0x0, 0xd, &(0x7f0000000780)='\x82#$\'wlan0self}user-)+em1\x00'}, 0xfd95) perf_event_open$cgroup(&(0x7f00000002c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x1414, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x9, @perf_bp={&(0x7f0000000100), 0xe}, 0x1020, 0xd7b, 0xfff, 0xe, 0x5, 0xff, 0x8435}, r7, 0x8, r8, 0xd) syz_open_dev$usbfs(0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x40000000000}, 0x0, &(0x7f0000000240)={0x1ff}, &(0x7f0000000000), 0x0) 05:37:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 370.447728] protocol 88fb is buggy, dev hsr_slave_0 [ 370.452905] protocol 88fb is buggy, dev hsr_slave_1 05:37:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) 05:37:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) io_setup(0x40, &(0x7f0000000480)) io_submit(0x0, 0x27f, &(0x7f0000001440)=[&(0x7f0000000200)={0xe9000000, 0x0, 0x700000000000000, 0x0, 0x0, r1, &(0x7f0000000340), 0x8}]) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1) writev(r4, &(0x7f0000000700)=[{&(0x7f0000000140)="3a615a21f47261228296fc4f46a4180ed26422207c353ede936f3fe41b9f1f8a74d0d5b6b06535156fdf6449b8ad082fc5f921df34bd4f36c28449805e6f3bcf2f87796c86b8e4e7", 0x48}, {&(0x7f0000000780)}, {&(0x7f0000000000)="61460000b7b9c405702504859d749a1194f46b0f45e75561f4cb5880", 0x1c}, {&(0x7f0000000280)="f2de9546a133bfe4f76f1aed55e5f2523c7949d441a9477439004e86ac8fd74e1f6f309f7e9cbf231058826d", 0x2c}, {&(0x7f00000002c0)="038efddcd12f43593e6b0fe309b7a2f1156ee33e38", 0x15}], 0x5) sendfile(r3, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x40008000ffffdffe) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c80, 0x0) r5 = openat$uhid(0xffffffffffffff9c, 0x0, 0x802, 0x0) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r6, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x1) writev(r6, &(0x7f0000000700)=[{&(0x7f0000000140)}, {&(0x7f0000000780)="fe196ec177a188e7921a2b95b2b9bc1e25edcd00570f26d61ba6dca954276ffaad47d2d2a5a2b8fe249ced0f796bc6f3319d1300523c9f63259b24f7b28be12a35c3de178093f35970ba8da630fda356f8c751cfc5764d2d9bdf3e3db0b13029b677d6bafc5ce99d2bebbe77916bba438c3c4ee319cda593e1dc0c8452c89afae10eff9a", 0x84}, {&(0x7f0000000380)="48a058274cb90795bd0e8caade457de99dd4f57836e503d91a2550fd0fb7fdd1b717b3edf6daae7a054ee1a0c1d5955b74f4371763869d0e7ce7ba9d37f1f22bc532e406b468a89c8d83221bfc1c0689650448a9b13315a0a4bec5307aecd0c01487f4fa5c999619917532e01c63091930cafd8cff47eaa400b4c29d111168d0de16fdce7ea9142190856de8ad51336cc27d0dbfb8641e69a705612db7139173f75795e3c3058841868a004cd81f3082", 0xb0}, {0x0}, {&(0x7f00000002c0)="038efddcd12f43593e6b0fe309b7a2f1156ee33e38", 0x15}, {&(0x7f0000000600)="aac963dcdd1b583a5cdb8e97e23bb214c8260d5f5815a5886dc0ee594f07c01d89c6ca30843aedc25b0cb0641ac8ad13632577f258efca03bd81f6843d7eb203d9aca961b8839837c020f4040e0e5c10a43026", 0x53}, {&(0x7f0000000980)}], 0x7) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r7 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="0b00000073797a31000000000000006adaa2b5000000000000000000000000e6ffffffffaa54d8aad9d035ed0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a31000000000000000000000020000000000000000000000000000000000000000000000000000000000000330000000000000000000000000015a9878a4e96ae1900000000000000"], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) sendfile(r7, 0xffffffffffffffff, 0x0, 0x40008000ffffdffe) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c80, 0x0) r8 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) sendfile(r8, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x40008000ffffdffe) r9 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r9, 0x4c80, 0x0) r10 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) writev(0xffffffffffffffff, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000780)}, {0x0}, {&(0x7f00000002c0)="038efddcd12f43593e6b0fe309b7a2f1156ee3", 0x13}, {&(0x7f0000000600)="aac963dcdd1b583a5cdb8e97e23bb214c8260d5f5815a5886dc0ee594f07c01d89c6ca30843aedc25b0cb0641ac8ad13632577f258efca03bd81f6843d7eb203d9ac", 0x42}, {0x0}], 0x6) sendfile(r10, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00'}) [ 371.087713] protocol 88fb is buggy, dev hsr_slave_0 [ 371.087754] protocol 88fb is buggy, dev hsr_slave_1 [ 371.092836] protocol 88fb is buggy, dev hsr_slave_1 [ 371.102998] protocol 88fb is buggy, dev hsr_slave_0 [ 371.108149] protocol 88fb is buggy, dev hsr_slave_1 05:37:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x4000000032, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r2, r1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r3, 0x0, 0xedc0) preadv(r1, &(0x7f0000000700)=[{&(0x7f0000000080)=""/182, 0xb6}, {&(0x7f0000000180)=""/140, 0x8c}, {&(0x7f00000002c0)=""/94, 0x5e}, {&(0x7f0000000340)=""/128, 0x80}, {&(0x7f00000003c0)=""/154, 0x9a}, {&(0x7f0000000480)=""/98, 0x62}, {&(0x7f0000000240)=""/13, 0xd}, {&(0x7f0000000500)=""/190, 0xbe}, {&(0x7f00000005c0)=""/31, 0x1f}, {&(0x7f0000000600)=""/228, 0xe4}], 0xa, 0x101) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000040)={'veth1_to_bond\x00', 0x2}) 05:37:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 371.647696] protocol 88fb is buggy, dev hsr_slave_0 05:37:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0xffffff46, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) write$P9_RVERSION(r2, &(0x7f00000000c0)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.L'}, 0x15) [ 374.301078] device bridge_slave_1 left promiscuous mode [ 374.306629] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.358744] device bridge_slave_0 left promiscuous mode [ 374.368446] bridge0: port 1(bridge_slave_0) entered disabled state [ 375.247990] net_ratelimit: 16 callbacks suppressed [ 375.247999] protocol 88fb is buggy, dev hsr_slave_0 [ 375.248035] protocol 88fb is buggy, dev hsr_slave_0 [ 375.253044] protocol 88fb is buggy, dev hsr_slave_1 [ 375.258080] protocol 88fb is buggy, dev hsr_slave_1 [ 375.807728] protocol 88fb is buggy, dev hsr_slave_0 [ 375.816637] protocol 88fb is buggy, dev hsr_slave_1 [ 375.967723] protocol 88fb is buggy, dev hsr_slave_0 [ 375.972857] protocol 88fb is buggy, dev hsr_slave_1 [ 376.687726] protocol 88fb is buggy, dev hsr_slave_0 [ 376.692933] protocol 88fb is buggy, dev hsr_slave_1 [ 380.611066] device hsr_slave_1 left promiscuous mode [ 380.653392] device hsr_slave_0 left promiscuous mode [ 380.701813] team0 (unregistering): Port device team_slave_1 removed [ 380.715671] team0 (unregistering): Port device team_slave_0 removed [ 380.727940] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 380.763274] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 380.847721] net_ratelimit: 17 callbacks suppressed [ 380.847728] protocol 88fb is buggy, dev hsr_slave_0 [ 380.852872] protocol 88fb is buggy, dev hsr_slave_1 [ 380.875945] bond0 (unregistering): Released all slaves [ 381.487720] protocol 88fb is buggy, dev hsr_slave_0 [ 381.487726] protocol 88fb is buggy, dev hsr_slave_0 [ 381.487794] protocol 88fb is buggy, dev hsr_slave_1 [ 381.492827] protocol 88fb is buggy, dev hsr_slave_1 [ 382.057739] protocol 88fb is buggy, dev hsr_slave_0 [ 382.062849] protocol 88fb is buggy, dev hsr_slave_1 [ 382.207767] protocol 88fb is buggy, dev hsr_slave_0 [ 382.213019] protocol 88fb is buggy, dev hsr_slave_1 05:37:41 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="440de70537dc6a504cb5c0df8b87fdcb00001000c5e2961aee889abb5fe4976ee7f2c4e068c0bdc96c422ba98889122c5a661c97a5245994b4681a806873c400000000c20c656df4cd980d34328b8194b13b9119efd8464f61175c5c47c0c4977e6873c298938613bd2451f79c74752b92c10b5cd166798d2c56cf4b986a3aa861ebdbba5209326854"], 0x1}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000000b00000040000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0) 05:37:41 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x17}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000200)={0x6, 0x118, 0xfa00, {{0x3, 0x40, "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", 0x0, 0x0, 0x47, 0xf8, 0x3f, 0x2, 0x1}, r1}}, 0x120) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="c5dd66924a35ead245d358a5eff14f9fb734391524b3a1bf088400000000e9328b9666b56d8683518007973363b1d738b5dec9be32d01b5045d918e2d496b2e7a895de78447a3505c4498acc02357a1932707095a0c706a3678fea1461a0d538"], 0x2) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='x'], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0xfc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:37:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(&(0x7f0000000340)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) pipe(0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff02c}, {0x6}]}, 0x10) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000400)={{{@in6, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000240)={@multicast1}, &(0x7f0000000500)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) pipe(&(0x7f0000000180)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x8ec0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socket(0x10, 0x803, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r3, 0x5) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0xa, 0x0, 0x0, 0x0, 0x1000000000054}, 0x98) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) fchdir(0xffffffffffffffff) socket$inet6(0xa, 0x400000000001, 0x0) 05:37:41 executing program 3: r0 = socket$inet6(0xa, 0x8004808000080003, 0x3) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffa}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) userfaultfd(0x0) setsockopt$inet6_dccp_buf(r0, 0x21, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) openat$cgroup(r1, 0x0, 0x200002, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4\x02\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x8001) write$cgroup_int(r2, &(0x7f0000000080)=0x1a001b00, 0x297ef) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000001880)='cgroup.type\x00', 0x2, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000080)='memory.high\x00', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x1, 0x400) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r7, r6, 0x0) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r8 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_dccp_buf(r2, 0x21, 0x80, &(0x7f0000000200)=""/66, &(0x7f0000000280)=0x42) sendfile(r6, r8, 0x0, 0xedc0) ioctl$DRM_IOCTL_GEM_OPEN(r8, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_GEM_CLOSE(r5, 0x40086409, &(0x7f0000000140)={r9}) 05:37:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000600)='f2fs\x00', 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) [ 382.364895] syz-executor.1: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 382.459502] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 382.470858] CPU: 0 PID: 14592 Comm: syz-executor.1 Not tainted 4.19.84 #0 [ 382.477830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.487198] Call Trace: [ 382.489818] dump_stack+0x197/0x210 [ 382.493513] warn_alloc.cold+0x7b/0x173 [ 382.497518] ? zone_watermark_ok_safe+0x260/0x260 [ 382.502390] ? lock_downgrade+0x880/0x880 [ 382.506570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 382.512122] ? avc_has_perm+0x404/0x610 [ 382.516119] __vmalloc_node_range+0x486/0x790 [ 382.520634] ? sel_write_load+0x1de/0x470 [ 382.524801] vmalloc+0x6b/0x90 [ 382.528011] ? sel_write_load+0x1de/0x470 [ 382.532202] sel_write_load+0x1de/0x470 [ 382.536195] __vfs_write+0x114/0x810 [ 382.539924] ? perf_trace_lock+0x510/0x510 [ 382.539938] ? sel_make_policy_nodes+0x1520/0x1520 [ 382.539953] ? kernel_read+0x120/0x120 [ 382.539970] ? __lock_is_held+0xb6/0x140 [ 382.539998] ? rcu_read_lock_sched_held+0x110/0x130 [ 382.540015] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 382.566846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 382.572402] ? __sb_start_write+0x1a9/0x360 [ 382.576744] vfs_write+0x20c/0x560 [ 382.580331] ksys_write+0x14f/0x2d0 [ 382.583971] ? __ia32_sys_read+0xb0/0xb0 [ 382.588133] ? do_syscall_64+0x26/0x620 [ 382.592128] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.597499] ? do_syscall_64+0x26/0x620 [ 382.597527] __x64_sys_write+0x73/0xb0 [ 382.605375] do_syscall_64+0xfd/0x620 [ 382.605400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.605418] RIP: 0033:0x45a639 [ 382.617563] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 382.636492] RSP: 002b:00007ff1ca438c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 382.644211] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 [ 382.651499] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 05:37:42 executing program 0: r0 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x7ffff000, 0x240, 0x0, 0xffffffffffffff37) [ 382.658780] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 382.666042] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff1ca4396d4 [ 382.673301] R13: 00000000004cb07b R14: 00000000004e35c0 R15: 00000000ffffffff 05:37:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', 0x0, 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 382.748393] Mem-Info: [ 382.751767] active_anon:213842 inactive_anon:1481 isolated_anon:0 [ 382.751767] active_file:10235 inactive_file:37751 isolated_file:0 [ 382.751767] unevictable:0 dirty:140 writeback:0 unstable:0 [ 382.751767] slab_reclaimable:13652 slab_unreclaimable:112327 [ 382.751767] mapped:59759 shmem:1546 pagetables:2741 bounce:0 [ 382.751767] free:1137852 free_pcp:404 free_cma:0 05:37:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r3, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000000)="a504", 0x2) setsockopt$inet_mtu(r3, 0x0, 0xa, 0x0, 0x0) 05:37:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0) [ 382.796290] Node 0 active_anon:855336kB inactive_anon:5916kB active_file:40736kB inactive_file:151212kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:239084kB dirty:552kB writeback:0kB shmem:6188kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 221184kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 382.918917] Node 1 active_anon:0kB inactive_anon:0kB active_file:148kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 05:37:42 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = socket(0xa, 0x3, 0x8) r3 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) sync() r5 = gettid() waitid(0x83b895581628fca4, r5, &(0x7f0000000040), 0x2, &(0x7f0000000480)) sendmsg$key(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r4, @ANYRESDEC=r5]], 0xfffffffffffffe56}}, 0x20004850) wait4(r5, &(0x7f0000000040), 0x47bc56ec4ede03b7, 0x0) r6 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x1, 0x600080) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000200)="b805000000b9510000000f01c10f46a78900000066ba2100b07bee66ba4100edb9800000830f32b9800000c00f3235000100000f300f304f215c66b808008ed0660f38806f000f011c268ee0", 0xfffffffffffffdfd}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x10004, 0x0) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000004cb, 0x0, 0x7, 0x0, 0x2]}) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) [ 382.958037] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 05:37:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:37:42 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x75) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r2}]]}}}]}, 0x38}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x4e24, @multicast1}, 0x18, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)='ip6gre0\x00', 0xbcad, 0x0, 0xfffc}) bind$unix(0xffffffffffffffff, 0x0, 0x0) [ 383.016473] lowmem_reserve[]: 0 2555 2557 2557 [ 383.021940] Node 0 DMA32 free:751224kB min:36248kB low:45308kB high:54368kB active_anon:855640kB inactive_anon:5916kB active_file:40736kB inactive_file:151212kB unevictable:0kB writepending:700kB present:3129332kB managed:2619976kB mlocked:0kB kernel_stack:9760kB pagetables:11016kB bounce:0kB free_pcp:1584kB local_pcp:980kB free_cma:0kB [ 383.099174] lowmem_reserve[]: 0 0 2 2 [ 383.112560] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 383.155370] lowmem_reserve[]: 0 0 0 0 [ 383.156715] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 383.169427] Node 1 Normal free:3783304kB min:53608kB low:67008kB high:80408kB active_anon:0kB inactive_anon:0kB active_file:148kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870180kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 383.230865] bridge0: port 3(gretap0) entered blocking state [ 383.245933] lowmem_reserve[]: 0 0 0 0 [ 383.259435] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 383.271211] bridge0: port 3(gretap0) entered disabled state [ 383.288955] Node 0 DMA32: 1217*4kB (UE) 893*8kB (UME) 160*16kB (UME) 38*32kB (UME) 290*64kB (U) 12*128kB (UE) 21*256kB (UM) 12*512kB (UM) 16*1024kB (UME) 4*2048kB (ME) 165*4096kB (M) = 747820kB [ 383.312513] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 383.335622] Node 1 Normal: 72*4kB (UME) 229*8kB (UE) 280*16kB (UME) 56*32kB [ 383.352888] (UE) 17*64kB (UME) 11*128kB (UE) 6*256kB (UME) 5*512kB (UM) 2*1024kB (M) 1*2048kB (E) 919*4096kB (M) = 3783304kB [ 383.370875] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 383.387437] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 383.404386] device gretap0 entered promiscuous mode [ 383.422314] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 383.443251] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 383.452377] bridge0: port 3(gretap0) entered blocking state [ 383.458889] bridge0: port 3(gretap0) entered forwarding state [ 383.463923] 49538 total pagecache pages [ 383.469464] 0 pages in swap cache [ 383.473384] Swap cache stats: add 0, delete 0, find 0/0 [ 383.488009] Free swap = 0kB 05:37:42 executing program 4: getrusage(0xffffffffffffffff, &(0x7f0000000280)) socket$inet_udp(0x2, 0x2, 0x0) 05:37:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', 0x0, 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 383.491071] Total swap = 0kB [ 383.494097] 1965979 pages RAM [ 383.497223] 0 pages HighMem/MovableOnly [ 383.511635] 338856 pages reserved [ 383.516826] 0 pages cma reserved [ 383.536091] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 05:37:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb9122"], 0x3e) 05:37:43 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:37:43 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f0000000280)={[{@dioread_nolock='dioread_nolock'}, {@usrjquota='usrjquota='}, {@init_itable_val={'init_itable'}}]}) 05:37:43 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in=@dev, @in6=@initdev}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) 05:37:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', 0x0, 0x18, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 383.710956] SELinux: policydb version 2621461 does not match my version range 15-31 [ 383.753735] SELinux: failed to load policy [ 383.804799] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 05:37:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb9122"], 0x3e) [ 383.899070] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock,usrjquota=,init_itable=0x0000000000000000, [ 384.002733] SELinux: policydb version 2621461 does not match my version range 15-31 [ 384.019429] SELinux: failed to load policy [ 384.062148] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock,usrjquota=,init_itable=0x0000000000000000, 05:37:44 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0xe9484f786a3bb8e4, 0x0, &(0x7f0000001100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0)="240000001a0025f00485bc04fef7001d020b49ffed000000800328000800030001000000", 0x24) r0 = socket(0x10, 0x400000000080803, 0x0) write(r0, &(0x7f00000001c0), 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x1, 0x8000, 0x204, 0x1f, 0x0, 0x1, 0xfffffffb, 0x7, 0x0}, &(0x7f0000000200)=0x20) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r2, 0x4}, 0x8) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) getpgrp(r3) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000010c0)='/selinux/checkreqprot\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f0000001140)={r2, @in6={{0xa, 0x4e21, 0x8000, @mcast1, 0xfffffffd}}, 0x4, 0x2, 0x100, 0x1, 0x4}, &(0x7f0000001200)=0x98) write$binfmt_misc(r4, &(0x7f0000000400)=ANY=[@ANYRES64=0x0], 0x8) write$P9_RREAD(r4, &(0x7f0000000080)={0x1001, 0x75, 0x0, {0xff6, "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"}}, 0x1001) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, 0xffffffffffffffff) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x107402, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r6, 0xc0046686, &(0x7f0000000640)=ANY=[@ANYBLOB="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"]) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r7, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r7, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r7, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r7, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 05:37:44 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:37:44 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040)=0x1, 0x4) syz_emit_ethernet(0xe1, &(0x7f0000000140)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0xab, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @dccp={{0x4e21, 0x4e21, 0x4, 0x1, 0x8, 0x0, 0x0, 0x9, 0x5, "cdc1d0", 0x7f, "0c1796"}, "dd2cb5fc47832e66fce39074e09f48a47adff64bfdb058433058ec22e2c4248485638ccc1bb8955837eea38e03218e8fccfde5f56a041bdf7460bda780c49a86dfcf39bc7549a40f1a4c81fa86d25b42f8d30b42ab601b9c1686cd2ca419a0cf08d5ca084cf4a20d92a3c6f5929b3c3e82f00887fb39581dd8a40e79bdc700c6b709adbfe58550e9dc550738da9f1147db10d789131b0ad2ab3d99"}}}}}}, 0x0) 05:37:44 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x40, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="d3fcd006b3c82c741a764cea80df4f2e5b", 0x11) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req={0x0, 0x0, 0xb4, 0x6}, 0xfffffffffffffcf3) fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, r2, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x9, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, 0x0) setsockopt$packet_int(r3, 0x107, 0xc, &(0x7f0000000100)=0x3, 0x4) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, r5, 0x0) write$P9_RWALK(r5, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r5, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, r4, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x501002, 0x0) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r6, 0x0) write$P9_RWALK(r6, 0x0, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r6, 0x0) stat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getegid() setresgid(0x0, r8, 0x0) fchown(0xffffffffffffffff, r7, r8) r9 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r9, &(0x7f00000003c0)=ANY=[], 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r9, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r9, 0xffffffffffffffff) ioctl$NS_GET_OWNER_UID(r9, 0xb704, &(0x7f0000000280)) stat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getegid() setresgid(0x0, r11, 0x0) fchown(0xffffffffffffffff, r10, r11) r12 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r12, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in, @in6=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000400)=0xe8) r13 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r13, 0x0) r14 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x2, 0x18) getsockopt$inet_IP_XFRM_POLICY(r14, 0x0, 0x11, &(0x7f0000001d40)={{{@in=@broadcast, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000001e40)=0xfffffffffffffe0f) stat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r16 = getegid() setresgid(0x0, r16, 0x0) fchown(0xffffffffffffffff, r15, r16) r17 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r17) r18 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r18, 0x0) ioctl$sock_SIOCGPGRP(r18, 0x8904, &(0x7f0000002540)) getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$int_in(r19, 0x5452, &(0x7f00005ebff8)=0x3f) fcntl$setsig(r19, 0xa, 0x12) fcntl$setownex(r19, 0xf, &(0x7f0000000180)={0x2}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003bc0)) r20 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$int_in(r21, 0x5452, &(0x7f00005ebff8)=0x3f) fcntl$setsig(r21, 0xa, 0x12) fcntl$setownex(r21, 0xf, &(0x7f0000000180)={0x2, r20}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000004ec0)) r22 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r22, 0xffffffffffffffff) r23 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r23, &(0x7f00000003c0)=ANY=[], 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r23, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) 05:37:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb9122"], 0x3e) 05:37:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, &(0x7f0000000740)='syz') r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 384.579356] IPv6 header not found [ 384.606529] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 384.615772] SELinux: policydb version 2621461 does not match my version range 15-31 [ 384.628026] IPv6 header not found [ 384.645186] nbd_handle_cmd: 42 callbacks suppressed [ 384.645208] block nbd2: Attempted send on invalid socket [ 384.655857] print_req_error: 42 callbacks suppressed [ 384.655868] print_req_error: I/O error, dev nbd2, sector 0 [ 384.667375] f2fs_msg: 57 callbacks suppressed [ 384.667405] F2FS-fs (nbd2): Unable to read 1th superblock [ 384.708765] SELinux: failed to load policy 05:37:44 executing program 5: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:37:44 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x6, 0x181801) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000180)={0x5, 0x3, 0x0, [{0x0, 0x2, 0x8, 0x5, 0x8, 0x8, 0x7}, {0xc5f3, 0x0, 0x3, 0x8, 0xf7, 0x0, 0xe1}, {0x8, 0x1000, 0x7e, 0x3, 0x6, 0x5, 0x6}]}) r1 = open(&(0x7f0000002000)='./bus\x00', 0x521483, 0x4) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r5, r4, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r6, 0x0, 0xedc0) accept$alg(r6, 0x0, 0x0) dup3(r3, r2, 0x0) fsetxattr$security_smack_transmute(r3, &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x9aabf3de4fc1f0a2) r7 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) fallocate(r7, 0x0, 0x0, 0x10000101) r8 = getpid() sched_setscheduler(r8, 0x5, 0x0) getpgrp(r8) setpriority(0x2, r8, 0x1000) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r10, r9, 0x0) connect$inet6(r9, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r11 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r9, r11, 0x0, 0xedc0) ioctl$LOOP_SET_BLOCK_SIZE(r11, 0x4c09, 0x7f) [ 384.750303] block nbd2: Attempted send on invalid socket [ 384.755975] print_req_error: I/O error, dev nbd2, sector 8 [ 384.772045] F2FS-fs (nbd2): Unable to read 2th superblock [ 384.819944] block nbd2: Attempted send on invalid socket [ 384.825507] print_req_error: I/O error, dev nbd2, sector 0 [ 384.833918] F2FS-fs (nbd2): Unable to read 1th superblock 05:37:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677"], 0x5d) [ 384.857352] audit: type=1804 audit(1574141864.313:4504): pid=14692 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir787344845/syzkaller.Gy1s3u/182/bus" dev="sda1" ino=16581 res=1 [ 384.908346] block nbd2: Attempted send on invalid socket [ 384.913962] print_req_error: I/O error, dev nbd2, sector 8 [ 384.932219] F2FS-fs (nbd2): Unable to read 2th superblock [ 385.004895] SELinux: policydb version 2621461 does not match my version range 15-31 [ 385.017917] SELinux: failed to load policy 05:37:44 executing program 5: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:37:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x6011}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r5, r4, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r6, 0x0, 0xedc0) getsockname$packet(r6, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r7 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x0) ftruncate(r8, 0x200004) sendfile(r1, r8, 0x0, 0x80001d00c0d0) 05:37:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 385.048066] audit: type=1804 audit(1574141864.353:4505): pid=14692 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir787344845/syzkaller.Gy1s3u/182/bus" dev="sda1" ino=16581 res=1 [ 385.254001] audit: type=1804 audit(1574141864.393:4506): pid=14692 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir787344845/syzkaller.Gy1s3u/182/bus" dev="sda1" ino=16581 res=1 [ 385.299949] block nbd2: Attempted send on invalid socket [ 385.305531] print_req_error: I/O error, dev nbd2, sector 0 [ 385.314914] audit: type=1804 audit(1574141864.553:4507): pid=14703 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir787344845/syzkaller.Gy1s3u/182/bus" dev="sda1" ino=16581 res=1 [ 385.318409] F2FS-fs (nbd2): Unable to read 1th superblock [ 385.350868] device nr0 entered promiscuous mode [ 385.362497] block nbd2: Attempted send on invalid socket [ 385.368499] print_req_error: I/O error, dev nbd2, sector 8 [ 385.375208] F2FS-fs (nbd2): Unable to read 2th superblock [ 385.381420] block nbd2: Attempted send on invalid socket [ 385.386945] print_req_error: I/O error, dev nbd2, sector 0 [ 385.392752] F2FS-fs (nbd2): Unable to read 1th superblock [ 385.409122] block nbd2: Attempted send on invalid socket [ 385.412982] audit: type=1804 audit(1574141864.583:4508): pid=14703 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir787344845/syzkaller.Gy1s3u/182/bus" dev="sda1" ino=16581 res=1 [ 385.414673] print_req_error: I/O error, dev nbd2, sector 8 [ 385.447892] F2FS-fs (nbd2): Unable to read 2th superblock [ 385.451183] audit: type=1804 audit(1574141864.653:4509): pid=14703 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir787344845/syzkaller.Gy1s3u/182/bus" dev="sda1" ino=16581 res=1 [ 385.491252] audit: type=1804 audit(1574141864.673:4510): pid=14692 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir787344845/syzkaller.Gy1s3u/182/bus" dev="sda1" ino=16581 res=1 [ 385.526217] audit: type=1804 audit(1574141864.683:4511): pid=14721 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir787344845/syzkaller.Gy1s3u/182/bus" dev="sda1" ino=16581 res=1 [ 385.566165] audit: type=1804 audit(1574141864.703:4512): pid=14703 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir787344845/syzkaller.Gy1s3u/182/bus" dev="sda1" ino=16581 res=1 [ 385.594582] audit: type=1804 audit(1574141864.823:4513): pid=14721 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir787344845/syzkaller.Gy1s3u/182/bus" dev="sda1" ino=16581 res=1 05:37:45 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000080)=0x1, 0x4) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 05:37:45 executing program 5: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:37:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677"], 0x5d) 05:37:45 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x400000000000009, &(0x7f00000003c0), 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x0) r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) getpgrp(0xffffffffffffffff) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) socket$inet6(0xa, 0x0, 0x0) 05:37:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 385.881822] device nr0 entered promiscuous mode [ 385.918418] block nbd2: Attempted send on invalid socket [ 385.923980] print_req_error: I/O error, dev nbd2, sector 0 [ 385.929832] F2FS-fs (nbd2): Unable to read 1th superblock 05:37:45 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 385.975260] block nbd2: Attempted send on invalid socket [ 385.980899] print_req_error: I/O error, dev nbd2, sector 8 [ 385.992012] F2FS-fs (nbd2): Unable to read 2th superblock 05:37:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677"], 0x5d) 05:37:45 executing program 3: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair(0x11, 0x1e6c75bafaa106cc, 0x80, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000300)={&(0x7f0000000080)=@in={0x2, 0x4e20, @rand_addr=0x1300}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000100)="759b99e6e0951d8e5cf99f1334f3383039cd3c4fac497780e1d7ffc5c9a8c1fc9426d6ad29f5b28b2755ef345f15e1f3ca75ce2afceccd343220e74b09d7a370fae0647d059da37910310a67e41c4dcef5f3063e31ef0e1092fe4d17b6ba5ea02e30e52817bd41ad022a9200aeb1720133f41d7b978b64fe3942caeda90e366e2e6158d8e036e6b64fe8344e3a5172ad5a30b858b1bf2b12b3f4cc8e60fdefd7c336ac76508ad1dd19202e5931a232e905d61e2d14bd6b5d83", 0xb9}, {&(0x7f00000001c0)="6d93b61cbd0a32a0e5dffb0bd58a5f2938ce45a8e4ca836cf98421e6d19c0347690aa94496883ea0bc24247070524444dfd839fe703ac4f2f1b5", 0x3a}, {&(0x7f0000000240)="5668c4fd2369d03699e2222ef104f855394711752c244007f974af3412a0dbc7930f1d7f7b0ad3d8ae75a7021f62f6fcbff4dfb3ef707851e75437614eb460101a89a775c12adb9ed84fb0243efdde0a64bbd9f629c5d68cbbd379e5ae0072c58e37d90775d1bcc926a6cc898f131e67f10f285f14bc32d6382ca17e8680", 0x7e}], 0x3, &(0x7f00000004c0)=[{0x70, 0x112, 0x5, "415906a00ddb61a591f17a7a9ae99b8a79043ea319cda259133786504d1e44689d6e75d33fcc84a4775ab850e0e2a17ece5d4e71ad3328784747c8b2fbadacbceba87b0a4aa3f7d3b2d77cf93811d23b93f8c8f3b6c48665fc3b97ae255fd9"}, {0x90, 0x117, 0x8, "60c58425817f8eeb2866cf46fa76f4ceaea6690de0e1bd77a15cb869fcdd244e6d469a7948b3f42e4034eb05293086027d09cdea93154038d49a2000f89eb63e41d6d27d180a65d02f29b91cb774cd9879deb091d8c3e61d96d472155f7ac68ae6667f86f3b9d3ccdee9f3dd3da7ea3ef0e33b7225a2b30f023c5d6b64a16ccd"}, {0x20, 0x1, 0x4, "f4f666b6d8d021115159ace5559630"}, {0xe8, 0xff, 0x1, "03c8bc7b4c0f8d38c1f4276b7d3561745bff66a1281d7e4fd52434877560057c43545d7657ac7e07d28de33a5fd5fbe781c50ab93c100a519c3f33d629b949fca71828434850a6b54d1491a1e1e845aa5b91e9b2727aae18dceb13c1b76fe9f2dfddb88a33563d785a25692b566f3789bbd2f8d018bc067fef7553a8970097ac3f2c0df67ae2ffdfe95f364bb8048a03a4ace999d3294b0a76655268554826ed986d000ec55abb6cbc043f08c1e8866c5abbb8c78af5a0990c60fb54a5d2784eeb55cab59cf3c853c97e2477eaf4b69c196915"}], 0x208}, 0x20000041) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)='X\x00\x00\x00', 0x4}], 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="9591c9ac90e8a73408e2ae010000000900b437b2dde707be7f0f1eeb68ba9b281f00014d8b86000000000000000000000000000000007af3c025543281b9d83730af47c772d85ef3b9827591c00b9e16b773b66b"], 0x54) close(r2) socket$netlink(0x10, 0x3, 0xf) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 05:37:45 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x400000000000009, &(0x7f00000003c0), 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x0) r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) getpgrp(0xffffffffffffffff) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) socket$inet6(0xa, 0x0, 0x0) 05:37:45 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 386.207726] net_ratelimit: 14 callbacks suppressed [ 386.207736] protocol 88fb is buggy, dev hsr_slave_0 [ 386.217908] protocol 88fb is buggy, dev hsr_slave_1 [ 386.367704] protocol 88fb is buggy, dev hsr_slave_0 [ 386.372877] protocol 88fb is buggy, dev hsr_slave_1 05:37:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x6011}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r5, r4, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r6, 0x0, 0xedc0) getsockname$packet(r6, &(0x7f0000000080), &(0x7f00000000c0)=0x14) r7 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x0) ftruncate(r8, 0x200004) sendfile(r1, r8, 0x0, 0x80001d00c0d0) 05:37:46 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:37:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r1, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x2) 05:37:46 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x400000000000009, &(0x7f00000003c0), 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x0) r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) getpgrp(0xffffffffffffffff) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) socket$inet6(0xa, 0x0, 0x0) 05:37:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab8643322770045"], 0x6d) [ 386.722056] SELinux: policydb version 2621461 does not match my version range 15-31 05:37:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, 0x0, 0x0) [ 386.791340] SELinux: failed to load policy 05:37:46 executing program 3: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) ftruncate(r1, 0x8200) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x100000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000000c0)={0x8, 0xd3, 0x331}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0xdf, 0x0, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) 05:37:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab8643322770045"], 0x6d) [ 386.853756] device nr0 entered promiscuous mode 05:37:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffff150002001300020000000000000000000000030006000000000002004e20e0000001000000000000002402000100f8beffff0000000200010000030005000000000002004e20e00000010000000000000000e8ee2a20c81e5bcd20f26da342882e4189da06b5ddfbba41e0e7a605cae91e7d8c9c211c7ddba5de"], 0x88}}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:46 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x400000000000009, &(0x7f00000003c0), 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x0) r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) getpgrp(0xffffffffffffffff) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) socket$inet6(0xa, 0x0, 0x0) 05:37:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, 0x0, 0x0) [ 387.021009] SELinux: policydb version 2621461 does not match my version range 15-31 [ 387.058020] SELinux: failed to load policy [ 387.087714] protocol 88fb is buggy, dev hsr_slave_0 [ 387.092852] protocol 88fb is buggy, dev hsr_slave_1 05:37:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, 0x0, 0x0) 05:37:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab8643322770045"], 0x6d) 05:37:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x2) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x3112db6baec8f394) fallocate(0xffffffffffffffff, 0x0, 0x8001, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000000)=@ethernet={0x0, @remote}, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000240)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="514c1cc2c4dad10000000000000000000000000000175af28d792da5c4cf2d62ce061a469f8febf7b654f4bf7566eee070e19e2d1285d7bfa5ce029a9da862bf662faa0ec7b27ab8a66df93fc470b21904a10fe9cec13cfd1097c9b23e0be80f85cbada4b79f", @ANYRES16, @ANYBLOB], 0x3}}, 0x4000) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x200000, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080), 0x10) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x943, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x200, 0x0) write$FUSE_LSEEK(r1, 0x0, 0xffffffffffffffba) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x14) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) write$FUSE_LSEEK(r3, 0x0, 0x0) r4 = creat(0x0, 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0 '], 0xb) close(0xffffffffffffffff) r5 = creat(&(0x7f00000003c0)='./file0\x00', 0x88) close(r5) ioctl$LOOP_SET_FD(r5, 0x4c00, 0xffffffffffffffff) 05:37:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000003740)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="310000001000050700000000000000fa0f190000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c050100626f6e0000000000009aa000080004000200000008000300a4000000"], 0x44}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x6, 0x3) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r3, r2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r4, 0x0, 0xedc0) recvmsg$kcm(r4, &(0x7f00000002c0)={&(0x7f0000000100)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000002600)=[{&(0x7f0000000180)=""/135, 0x87}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000000240)=""/5, 0x5}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000000280)}, {&(0x7f0000002340)=""/252, 0xfc}, {&(0x7f0000002440)=""/145, 0x91}, {&(0x7f0000002500)=""/120, 0x78}, {&(0x7f0000002580)=""/98, 0x62}], 0x9, &(0x7f00000026c0)=""/188, 0xbc}, 0x40000100) sendmsg$nl_route(r0, &(0x7f0000002840)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000002800)={&(0x7f0000002780)=@ipv4_newaddr={0x54, 0x14, 0x10, 0x70bd29, 0x25dfdbff, {0x2, 0x0, 0x80, 0xc76421de02157f2a, r5}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x9a069b8, 0x5, 0x8001}}, @IFA_BROADCAST={0x8, 0x4, @multicast1}, @IFA_BROADCAST={0x8, 0x4, @local}, @IFA_BROADCAST={0x8, 0x4, @rand_addr=0x2b2}, @IFA_LOCAL={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xf}}, @IFA_BROADCAST={0x8, 0x4, @empty}]}, 0x54}, 0x1, 0x0, 0x0, 0x4010}, 0x800) r6 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 05:37:47 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x400000000000009, &(0x7f00000003c0), 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x0) r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) getpgrp(0xffffffffffffffff) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 387.667540] SELinux: policydb version 2621461 does not match my version range 15-31 05:37:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 387.717111] SELinux: failed to load policy [ 387.727727] protocol 88fb is buggy, dev hsr_slave_0 [ 387.732865] protocol 88fb is buggy, dev hsr_slave_1 [ 387.736171] protocol 88fb is buggy, dev hsr_slave_0 [ 387.743896] protocol 88fb is buggy, dev hsr_slave_1 05:37:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870e"], 0x75) 05:37:47 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x400000000000009, &(0x7f00000003c0), 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x0) r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 387.771178] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 05:37:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 05:37:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 05:37:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0}, 0x0) 05:37:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870e"], 0x75) [ 388.400660] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. 05:37:47 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x400000000000009, &(0x7f00000003c0), 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x0) r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:48 executing program 3: 05:37:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:48 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x400000000000009, &(0x7f00000003c0), 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x0) r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) getpgrp(0xffffffffffffffff) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0}, 0x0) 05:37:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870e"], 0x75) 05:37:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:48 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x163, 0x11, 0x4}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket(0x0, 0x4008000000803, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r3, r2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r4, 0x0, 0xedc0) bind(r4, &(0x7f0000000040)=@l2={0x1f, 0x77, {0x5, 0x1, 0x2, 0x20, 0xaf, 0x45}, 0x2, 0x1}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 05:37:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0}, 0x0) 05:37:48 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x400000000000009, &(0x7f00000003c0), 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x0) socket$inet6(0xa, 0x40000000000001, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:48 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x400000000000009, &(0x7f00000003c0), 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x0) r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 388.938137] SELinux: policydb version 2621461 does not match my version range 15-31 [ 389.014857] SELinux: failed to load policy 05:37:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c8"], 0x79) 05:37:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8"], 0x1}}, 0x0) 05:37:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:48 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x400000000000009, &(0x7f00000003c0), 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r2, r1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r3, 0x0, 0xedc0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000140)={{{@in6, @in6=@local}}, {{@in6=@remote}}}, &(0x7f0000000000)=0xe8) connect$inet(r0, &(0x7f0000000c40)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) setsockopt$sock_linger(r0, 0x1, 0x3d, &(0x7f0000000080), 0x8) sendmmsg$sock(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@txtime={{0x18}}], 0x18}}], 0x2ec, 0x0) [ 389.254405] SELinux: policydb version 2621461 does not match my version range 15-31 [ 389.374542] SELinux: failed to load policy 05:37:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8"], 0x1}}, 0x0) 05:37:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c8"], 0x79) 05:37:49 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x400000000000009, &(0x7f00000003c0), 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 389.711896] SELinux: policydb version 2621461 does not match my version range 15-31 [ 389.761217] SELinux: failed to load policy 05:37:49 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x400000000000009, &(0x7f00000003c0), 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8"], 0x1}}, 0x0) 05:37:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup\x00\x8es', 0x200002, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000006c0)='/dev/input/mouse#\x00', 0x0, 0x82) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x3c, r3, 0x439, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'caif0\x00'}]}]}, 0x3c}}, 0x0) r4 = socket(0x40000000015, 0x5, 0x0) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendmsg$xdp(r4, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) r5 = socket(0x0, 0x5, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r7, r6, 0x0) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r8 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r6, r8, 0x0, 0xedc0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r6, r9, r10) r11 = socket$inet6(0xa, 0x2, 0x0) r12 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r12, r11, 0x0) connect$inet6(r11, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r13 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r11, r13, 0x0, 0xedc0) sendto$packet(r13, &(0x7f00000009c0)="7e622387892be6acbea8a6bcd2dab5368f21ac710729fd35a43c739860692fd1e3afc2823dba75d9ca9968b8fb9918f09468e9c19e5f5797abe47c84fd39cbc1b3c7eb6d2695de01602e88602006158be2ef6bd2edbac6a0938efee637e97ded1cc32089b184b7d3e60be4edfe89e8c39220f07e2f38573d8b763d00e8472fb77c9458c8c55e2dfa10dbff7d73925c913e3c", 0x92, 0x800, 0x0, 0x0) bind$inet(r5, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendmsg$xdp(r5, 0x0, 0x0) recvmmsg(r5, &(0x7f0000005d40)=[{{&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000080)=[{&(0x7f0000000380)=""/251, 0xfb}], 0x1}}, {{&(0x7f00000020c0)=@caif=@dgm, 0x3e7, &(0x7f00000034c0)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000003840)=[{0x0}], 0x1}}], 0x4000000000001cd, 0xc49a14533cb908ca, 0x0) sendmsg$xdp(r4, &(0x7f0000000840)={&(0x7f0000000340)={0x2c, 0x2, 0x0, 0xc}, 0x10, &(0x7f0000000780)=[{&(0x7f0000000380)="1c93b3cf1da4ecb9f1c662814cddc9b866eac09af3e0e45025047706004ff12f", 0x20}, {&(0x7f0000000740)="01dea0267f8a09a5112e52ad7609d51df70f43c11e060f77e2562f0ddd1573", 0x1f}], 0x2, 0x0, 0x0, 0x20040081}, 0x40000000) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x82900500}, 0xc, &(0x7f00000007c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="c7a94b62f475d088498fd3c605f732e6db0c10a8be6f5ed9f70dcbc8b5a4f9560c3064e88df7242762876e77efca05497eb3aafe1db9b6afda055c1a46fa1ff67f09e61412d292bc04cd1922d6b3cf6aeaa6de4a26321910272acde450eee9c5e2a6500f1fcde3552c6ff348e2f087fc8f99a5f6526b75a6c6a31d94808c5d15251e6e46594de1cb5f55b6ed4098ab1b0ee2553879620ca7efc1ac8facf19e9e19d98314772d22fe73807da8a3d44510da", @ANYRES16=r3, @ANYBLOB="000029bd7000fddbdf25110000000c00020008000b00020000002c0001000c00070020000000230000000c0007001a4987fc100000000800010032e900000800020033000000080006000104000008000500ff07000008000400de7b2d"], 0x3}, 0x1, 0x0, 0x0, 0xc00}, 0x24024c10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="cc000000", @ANYRES16=0x0, @ANYBLOB="040028bd7000ffdbdf2516000000480005000800010065746800340002000800010000000080080004000500000008000300000000000800040000000000080001001c0000000800040000000000080001006962000028000700080001000200000008000100080000000c0004000000000000000000080001006500000048005624961a070008000200ff00000008000200000000000800020003000000080001000c0000000800010014000000080003000700000008000200ff7f0000080001001b000000"], 0xcc}, 0x1, 0x0, 0x0, 0x20000800}, 0x40) 05:37:49 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x400000000000009, &(0x7f00000003c0), 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c8"], 0x79) 05:37:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r2, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 390.007030] nbd_handle_cmd: 30 callbacks suppressed [ 390.007046] block nbd2: Attempted send on invalid socket [ 390.017895] print_req_error: 30 callbacks suppressed [ 390.017906] print_req_error: I/O error, dev nbd2, sector 0 [ 390.037589] SELinux: policydb version 2621461 does not match my version range 15-31 [ 390.038610] f2fs_msg: 30 callbacks suppressed [ 390.038629] F2FS-fs (nbd2): Unable to read 1th superblock [ 390.059543] SELinux: failed to load policy [ 390.071768] block nbd2: Attempted send on invalid socket [ 390.077336] print_req_error: I/O error, dev nbd2, sector 8 [ 390.084186] F2FS-fs (nbd2): Unable to read 2th superblock 05:37:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES32], 0x1}}, 0x0) 05:37:49 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x400000000000009, &(0x7f00000003c0), 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 390.100420] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 390.124709] block nbd2: Attempted send on invalid socket [ 390.130389] print_req_error: I/O error, dev nbd2, sector 0 [ 390.153139] IPVS: Error connecting to the multicast addr 05:37:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d00"], 0x7b) [ 390.157880] F2FS-fs (nbd2): Unable to read 1th superblock [ 390.164504] block nbd2: Attempted send on invalid socket [ 390.170142] print_req_error: I/O error, dev nbd2, sector 8 [ 390.180344] F2FS-fs (nbd2): Unable to read 2th superblock 05:37:49 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x400000000000009, &(0x7f00000003c0), 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES32], 0x1}}, 0x0) [ 390.313763] SELinux: policydb version 2621461 does not match my version range 15-31 [ 390.352449] SELinux: failed to load policy 05:37:49 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x400000000000009, &(0x7f00000003c0), 0x4) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d00"], 0x7b) 05:37:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r1, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES32], 0x1}}, 0x0) [ 390.725231] SELinux: policydb version 2621461 does not match my version range 15-31 [ 390.725918] block nbd2: Attempted send on invalid socket [ 390.739144] print_req_error: I/O error, dev nbd2, sector 0 [ 390.740511] IPVS: Error connecting to the multicast addr [ 390.751333] F2FS-fs (nbd2): Unable to read 1th superblock [ 390.753514] SELinux: failed to load policy [ 390.785827] block nbd2: Attempted send on invalid socket [ 390.791517] print_req_error: I/O error, dev nbd2, sector 8 [ 390.800657] F2FS-fs (nbd2): Unable to read 2th superblock 05:37:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32], 0x2}}, 0x0) 05:37:50 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x400000000000009, &(0x7f00000003c0), 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:50 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d00"], 0x7b) 05:37:50 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x400000000000009, &(0x7f00000003c0), 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 390.844337] block nbd2: Attempted send on invalid socket [ 390.850124] print_req_error: I/O error, dev nbd2, sector 0 [ 390.856606] F2FS-fs (nbd2): Unable to read 1th superblock [ 390.863063] block nbd2: Attempted send on invalid socket [ 390.868788] print_req_error: I/O error, dev nbd2, sector 8 [ 390.874807] F2FS-fs (nbd2): Unable to read 2th superblock 05:37:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r1, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32], 0x2}}, 0x0) [ 391.003270] SELinux: policydb version 2621461 does not match my version range 15-31 [ 391.046992] SELinux: failed to load policy 05:37:50 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:50 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x400000000000009, &(0x7f00000003c0), 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:50 executing program 0: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x80000001, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)="196bf99d3e6b171e5be95a9aec9c9f1604ace33edb7d9be37160a62ac51b944d86f04877834ac52cf1c3e7535de506d93bf8c61811dd76dd6beb6ab43b6e92f62beb78624a1e2b71eb", 0x49, 0xfffffffffffffffd) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) r3 = getegid() keyctl$chown(0x4, r1, r2, r3) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)="1e8fc53933aa52b2c72f35f4e83fe7830ad0a0fbd85f4a5942147f24762da72e45630f12f806bf1df89108740071b7dc8639a35660f83fb9d67a3deefc8b0098384f08f85bd945d50f44f50a2df5e9be5502afe9ac8f0ad14a643700120090967bf74de48bb499139c4579fa13e45bf397459cf0bd2a7c86f1641e7965281f89dabcb5a4b27c810565b325d7521da8d2012941c69c51ab9384da9b8dfb50f9f7205ae6c7a1aeddd0949b133d0abfe7efd6eb2c1603f383bd8cc33823f2d88f1ef6b0aa2b9399a382239f0697f52ac1fdb014169865e28b42522c9db47332fd4f52984d3f263cf9e798696451528bdbd3749774", 0xf3, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000003c0)="11d93f9c6b6708a16a97b8e4d4643f34a08e3ba7eb21215b09b5cbc60c52aff7438d56c26de1cb3f66d134d64eeb183dc54887276b8fffbb06aaa4ad2a75e7a2d22844a8013b1434b3c8c725695033e921e8ef412f96aea34da1d8d96643533c7aaa6056f53f70fa1601732e19f69cfe626f6da404e68a00409ba7735ad9cf2e1adedaed9d10a3e9d64d4c340376d9459d67449c728494eb7c14dd93e6d2e971707d19e6045b4a38c8870c2bf87594ec4259dfea2760514950f146c204b0b862ae029887ec9383235c99f6fcafe82a6f1bc2", 0xd2, 0x0) keyctl$dh_compute(0x17, &(0x7f00000004c0)={r1, r4, r5}, &(0x7f0000000500)=""/88, 0x58, &(0x7f0000000680)={&(0x7f0000000580)={'vmac64(seed-generic)\x00'}, &(0x7f00000005c0)="bce7515c4e355832cc986b0447dc65a71105f353beec3e287aea784357bc57e88037f0995b664010a2d24b5e1a885d89619859cb89bdf59debae9f38fab8a0181ec98d0cc5bef13a58037d9b6fa6d774eedfcce08894ce55ace70654548a838f6c9f451871ea5cf46ec6882d98252736fbfdf985a60c8aba43f9166d1dcc3aa2095ecca28c8d895be4", 0x89}) r6 = request_key(&(0x7f00000006c0)='pkcs7_test\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='selfselinuxselinux\x00', 0xfffffffffffffffc) r7 = add_key(&(0x7f0000000780)='cifs.spnego\x00', &(0x7f00000007c0)={'syz', 0x1}, &(0x7f0000000800)="d1a176ad1aabb6799f1872fe9ce8e981d21dff88ea3069934a4bc818a2a7f0c37977f7f2f3876cd94c5d354d395a494ca81fd87e1e7951b2fd8984b880d76c9dce219743824c74dd1f991c6f2a0d86d4d5d52d94fe0e9683de579f2f5053267e33a5f5ba353cac18315e7ed32dff66168e474a3f1575436f138c34f55f0653", 0x7f, 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f0000000880)={r1, r6, r7}, &(0x7f00000008c0)=""/173, 0xad, &(0x7f0000000a40)={&(0x7f0000000980)={'tgr128\x00'}, &(0x7f00000009c0)="ffc5389ddc44e26a4a664180f8bb418cf151bdc1aca0bf0c57431e32146fa2c9435b83cfbf6ed70ea555819367f9e1b9db999907d8c2939e049f631c5ff05f1f832db6fc587326c32abad5585853", 0x4e}) r8 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/ubi_ctrl\x00', 0x20, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r8, 0x894b, &(0x7f0000000ac0)) socket$netlink(0x10, 0x3, 0x4) bind$llc(r0, &(0x7f0000000b00)={0x1a, 0x23, 0xd0, 0x4, 0x80, 0x81, @link_local}, 0x10) r9 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000b40)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10, 0x800) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0}, &(0x7f0000000bc0)=0x14) connect(r9, &(0x7f0000000c00)=@xdp={0x2c, 0x2, r10, 0x1b}, 0x80) r11 = socket$inet_dccp(0x2, 0x6, 0x0) r12 = dup2(r11, r0) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000c80)={0xffffffffffffffff}) getpeername$ax25(r13, &(0x7f0000000cc0)={{}, [@netrom, @null, @remote, @netrom, @default, @remote, @bcast, @default]}, &(0x7f0000000d40)=0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000e80)={r12, 0x10, &(0x7f0000000e40)={&(0x7f0000000d80)=""/154, 0x9a}}, 0x10) r14 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r14, &(0x7f0000000ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000f00)=0x14) r15 = openat$zero(0xffffffffffffff9c, &(0x7f0000000f40)='/dev/zero\x00', 0xd26d08048d9fcb43, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r15, 0x40082406, &(0x7f0000000f80)='pkcs7_test\x00') r16 = creat(&(0x7f0000000fc0)='./file0\x00', 0xc0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r16, 0x29, 0x20, &(0x7f0000001000)={@ipv4={[], [], @multicast2}, 0x40, 0x0, 0x0, 0x3, 0x8, 0x20}, 0x20) 05:37:50 executing program 1 (fault-call:4 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 391.134734] block nbd2: Attempted send on invalid socket [ 391.140727] print_req_error: I/O error, dev nbd2, sector 0 [ 391.165607] F2FS-fs (nbd2): Unable to read 1th superblock 05:37:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32], 0x2}}, 0x0) [ 391.244973] block nbd2: Attempted send on invalid socket [ 391.251247] net_ratelimit: 14 callbacks suppressed [ 391.251256] protocol 88fb is buggy, dev hsr_slave_0 [ 391.251322] protocol 88fb is buggy, dev hsr_slave_1 [ 391.266807] print_req_error: I/O error, dev nbd2, sector 8 [ 391.291033] F2FS-fs (nbd2): Unable to read 2th superblock [ 391.292867] FAULT_INJECTION: forcing a failure. [ 391.292867] name failslab, interval 1, probability 0, space 0, times 1 [ 391.329830] CPU: 1 PID: 15444 Comm: syz-executor.1 Not tainted 4.19.84 #0 [ 391.336820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.346185] Call Trace: [ 391.348808] dump_stack+0x197/0x210 [ 391.352671] should_fail.cold+0xa/0x1b [ 391.356623] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 391.361737] ? lock_downgrade+0x880/0x880 [ 391.365978] __should_failslab+0x121/0x190 [ 391.370233] should_failslab+0x9/0x14 [ 391.374026] kmem_cache_alloc_node_trace+0x274/0x720 [ 391.379134] ? kasan_check_read+0x11/0x20 [ 391.383311] __get_vm_area_node+0x12b/0x3a0 [ 391.387628] __vmalloc_node_range+0xc7/0x790 [ 391.392031] ? sel_write_load+0x1de/0x470 [ 391.396173] ? sel_write_load+0x1de/0x470 [ 391.400326] vmalloc+0x6b/0x90 [ 391.403509] ? sel_write_load+0x1de/0x470 [ 391.407646] sel_write_load+0x1de/0x470 [ 391.411615] __vfs_write+0x114/0x810 [ 391.415321] ? perf_trace_lock+0x510/0x510 [ 391.419564] ? sel_make_policy_nodes+0x1520/0x1520 [ 391.424497] ? kernel_read+0x120/0x120 [ 391.428377] ? __lock_is_held+0xb6/0x140 [ 391.432438] ? rcu_read_lock_sched_held+0x110/0x130 [ 391.437447] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 391.442207] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.447737] ? __sb_start_write+0x1a9/0x360 [ 391.452051] vfs_write+0x20c/0x560 [ 391.455589] ksys_write+0x14f/0x2d0 [ 391.459208] ? __ia32_sys_read+0xb0/0xb0 [ 391.463357] ? do_syscall_64+0x26/0x620 [ 391.467332] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 391.472682] ? do_syscall_64+0x26/0x620 [ 391.476652] __x64_sys_write+0x73/0xb0 [ 391.480530] do_syscall_64+0xfd/0x620 [ 391.484327] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 391.489518] RIP: 0033:0x45a639 [ 391.492715] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 391.511603] RSP: 002b:00007ff1ca438c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 391.519301] RAX: ffffffffffffffda RBX: 00007ff1ca438c90 RCX: 000000000045a639 [ 391.526558] RDX: 000000000000004b RSI: 0000000020000000 RDI: 0000000000000004 [ 391.533814] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 05:37:51 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 391.541070] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff1ca4396d4 [ 391.548327] R13: 00000000004cb07b R14: 00000000004e35c0 R15: 0000000000000005 05:37:51 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x400000000000009, &(0x7f00000003c0), 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 391.628065] syz-executor.1: vmalloc: allocation failure: 75 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 391.644135] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 391.656788] CPU: 0 PID: 15444 Comm: syz-executor.1 Not tainted 4.19.84 #0 [ 391.664706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.674067] Call Trace: 05:37:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @empty}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x2f5, 0x200007fc, &(0x7f0000000000)={0x2, 0x3, @local}, 0x10) fdatasync(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x3d6, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) getpriority(0x2, r1) sendto(r0, &(0x7f0000000040)='J', 0xffffffffffffff7e, 0x8841, 0x0, 0xfffffffffffffebd) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r3, r2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r4, 0x0, 0xedc0) shutdown(r4, 0x3) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000340)='threaded\x00', 0xffffffc5) recvfrom$inet(r0, 0x0, 0x0, 0x80040000101, 0x0, 0x2f49b2819fbc7c26) 05:37:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf52703", @ANYRES32], 0x2}}, 0x0) [ 391.676677] dump_stack+0x197/0x210 [ 391.680354] warn_alloc.cold+0x7b/0x173 [ 391.684339] ? zone_watermark_ok_safe+0x260/0x260 [ 391.689184] ? __get_vm_area_node+0x12b/0x3a0 [ 391.693796] ? rcu_read_lock_sched_held+0x110/0x130 [ 391.698834] ? __get_vm_area_node+0x2df/0x3a0 [ 391.703361] __vmalloc_node_range+0x486/0x790 [ 391.707960] ? sel_write_load+0x1de/0x470 [ 391.712126] vmalloc+0x6b/0x90 [ 391.715334] ? sel_write_load+0x1de/0x470 [ 391.719489] sel_write_load+0x1de/0x470 [ 391.723473] __vfs_write+0x114/0x810 [ 391.727204] ? perf_trace_lock+0x510/0x510 [ 391.731450] ? sel_make_policy_nodes+0x1520/0x1520 [ 391.736383] ? kernel_read+0x120/0x120 [ 391.740274] ? __lock_is_held+0xb6/0x140 [ 391.744340] ? rcu_read_lock_sched_held+0x110/0x130 [ 391.749345] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 391.754087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.759620] ? __sb_start_write+0x1a9/0x360 [ 391.763943] vfs_write+0x20c/0x560 [ 391.767475] ksys_write+0x14f/0x2d0 [ 391.771138] ? __ia32_sys_read+0xb0/0xb0 [ 391.775194] ? do_syscall_64+0x26/0x620 [ 391.779169] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 391.784529] ? do_syscall_64+0x26/0x620 [ 391.788515] __x64_sys_write+0x73/0xb0 [ 391.792387] do_syscall_64+0xfd/0x620 [ 391.796174] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 391.801360] RIP: 0033:0x45a639 [ 391.804552] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:37:51 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 391.823524] RSP: 002b:00007ff1ca438c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 391.831283] RAX: ffffffffffffffda RBX: 00007ff1ca438c90 RCX: 000000000045a639 [ 391.838550] RDX: 000000000000004b RSI: 0000000020000000 RDI: 0000000000000004 [ 391.845817] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 391.853092] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff1ca4396d4 [ 391.860357] R13: 00000000004cb07b R14: 00000000004e35c0 R15: 0000000000000005 [ 391.885327] Mem-Info: [ 391.888286] protocol 88fb is buggy, dev hsr_slave_0 [ 391.888340] protocol 88fb is buggy, dev hsr_slave_1 [ 391.888560] protocol 88fb is buggy, dev hsr_slave_0 [ 391.888614] protocol 88fb is buggy, dev hsr_slave_1 05:37:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r1, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:51 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x400000000000009, &(0x7f00000003c0), 0x4) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf52703", @ANYRES32], 0x2}}, 0x0) 05:37:51 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:51 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000000c0)=0x4) ftruncate(r2, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) pipe(0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r4, r3, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) socket(0x11, 0xd, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r6 = socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r7, r6, 0x0) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r8 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r6, r8, 0x0, 0xedc0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000100)=@req3={0x1f, 0x6, 0x401, 0x2, 0x3, 0x5, 0x40}, 0x1c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./bus\x00', 0x0, 0x30}, 0x10) ioctl$VT_RESIZE(r8, 0x5609, &(0x7f0000000080)={0x8, 0xfff9, 0x400}) sendfile(r3, r5, 0x0, 0xedc0) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) [ 392.417745] active_anon:210376 inactive_anon:1481 isolated_anon:0 [ 392.417745] active_file:10227 inactive_file:37819 isolated_file:0 [ 392.417745] unevictable:25 dirty:178 writeback:0 unstable:0 [ 392.417745] slab_reclaimable:13816 slab_unreclaimable:116178 [ 392.417745] mapped:59754 shmem:1546 pagetables:2675 bounce:0 [ 392.417745] free:1137188 free_pcp:602 free_cma:0 [ 392.447733] protocol 88fb is buggy, dev hsr_slave_0 [ 392.453117] Node 0 active_anon:841404kB inactive_anon:5924kB active_file:40760kB inactive_file:151276kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:238916kB dirty:708kB writeback:0kB shmem:6184kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 212992kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 392.457108] protocol 88fb is buggy, dev hsr_slave_1 [ 392.485678] Node 1 active_anon:0kB inactive_anon:0kB active_file:148kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 392.516613] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 392.543041] lowmem_reserve[]: 0 2555 2557 2557 [ 392.547850] Node 0 DMA32 free:749860kB min:36248kB low:45308kB high:54368kB active_anon:841404kB inactive_anon:5924kB active_file:40760kB inactive_file:151276kB unevictable:0kB writepending:856kB present:3129332kB managed:2619976kB mlocked:0kB kernel_stack:9472kB pagetables:10700kB bounce:0kB free_pcp:2460kB local_pcp:1144kB free_cma:0kB [ 392.578290] lowmem_reserve[]: 0 0 2 2 [ 392.582268] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 392.617913] protocol 88fb is buggy, dev hsr_slave_0 [ 392.617984] protocol 88fb is buggy, dev hsr_slave_1 [ 392.630022] lowmem_reserve[]: 0 0 0 0 [ 392.633874] Node 1 Normal free:3783304kB min:53608kB low:67008kB high:80408kB active_anon:0kB inactive_anon:0kB active_file:148kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870180kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 392.661786] lowmem_reserve[]: 0 0 0 0 [ 392.665987] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 392.680180] Node 0 DMA32: 1604*4kB (UME) 126*8kB (UME) 44*16kB (UME) 17*32kB (UME) 79*64kB (UE) 54*128kB (UE) 23*256kB (UME) 15*512kB (UME) 15*1024kB (UM) 8*2048kB (ME) 167*4096kB (M) = 749984kB [ 392.698128] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 392.709854] Node 1 Normal: 72*4kB (UME) 229*8kB (UE) 280*16kB (UME) 56*32kB (UE) 17*64kB (UME) 11*128kB (UE) 6*256kB (UME) 5*512kB (UM) 2*1024kB (M) 1*2048kB (E) 919*4096kB (M) = 3783304kB [ 392.727454] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 392.737286] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 392.746035] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 392.755070] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 392.763722] 49585 total pagecache pages 05:37:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:37:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf52703", @ANYRES32], 0x2}}, 0x0) 05:37:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r1, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:52 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:52 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x36d) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, &(0x7f0000000500)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0xffffffff, @empty}, 0x16) sendmmsg$inet(r0, &(0x7f0000000900)=[{{0x0, 0x34e, &(0x7f00000004c0)=[{&(0x7f0000000400)="cb", 0x1}], 0x8}}], 0x40000000000021e, 0x4000841) [ 392.767890] 0 pages in swap cache [ 392.771346] Swap cache stats: add 0, delete 0, find 0/0 [ 392.776700] Free swap = 0kB [ 392.779791] Total swap = 0kB [ 392.782846] 1965979 pages RAM [ 392.785946] 0 pages HighMem/MovableOnly [ 392.789989] 338856 pages reserved [ 392.793441] 0 pages cma reserved 05:37:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a0", @ANYRES32], 0x2}}, 0x0) 05:37:52 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r1, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 392.930754] SELinux: policydb version 2621461 does not match my version range 15-31 [ 392.962831] SELinux: failed to load policy 05:37:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9020000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:37:52 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:52 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28, 0x10, &(0x7f0000000000), 0xfeb6}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x80000, 0x7) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r4, r3, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r5, 0x0, 0xedc0) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r7, r6, 0x0) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r8 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r9 = socket$inet6(0xa, 0x2, 0x0) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r10, r9, 0x0) connect$inet6(r9, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r11 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r9, r11, 0x0, 0xedc0) sendfile(r11, r8, 0x0, 0xedc0) r12 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r12, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r12, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r13 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r13, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r12, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={r14}, 0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r8, 0x84, 0x6d, &(0x7f0000000840)={r14, 0xbc, "f1408383ca8227153a90d095da222bcc42f7f43bb8f8b9126312af6eb8672114f490c11606c00d84160f0b289545e0cd3306a975072eb44d0eb25b6bf676cca4366a4ad53705c93f10fdc88bdaa8c665b5fc735772618b8c71754433f105f5ab5ce0836678f79c9504a99600c6f6b6f6f027a153412b55c4ecf35d4967e0c9d9fd0fc6ad7c34defa1195a97de7788094c12b5350846bfddecaaccd83b94b9f649c044f0d4fd4218ff4730dcf9fecf91ba2cafa706472f9d9530d9271"}, &(0x7f0000000180)=0xc4) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f00000001c0)={r15, 0xc27}, &(0x7f00000002c0)=0xc) r16 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r16, r2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r17 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r17, 0x0, 0xedc0) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@empty}}, &(0x7f0000000080)=0xe8) r19 = getegid() write$FUSE_ATTR(r1, &(0x7f00000000c0)={0x78, 0x0, 0x4, {0xdb29, 0x1, 0x0, {0x5, 0x1, 0x7, 0x0, 0x5036ff53, 0x5f11, 0xff, 0x3, 0x5, 0x7ff, 0x3ff, r18, r19, 0x2, 0x4}}}, 0x78) creat(0x0, 0x10) [ 393.147041] kauditd_printk_skb: 3 callbacks suppressed [ 393.147056] audit: type=1400 audit(1574141872.613:4517): avc: denied { prog_load } for pid=15514 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 05:37:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a0", @ANYRES32], 0x2}}, 0x0) 05:37:52 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) [ 393.218571] SELinux: policydb string length 2 does not match expected length 8 [ 393.257297] SELinux: failed to load policy 05:37:52 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r1, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9030000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:37:52 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 05:37:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a0", @ANYRES32], 0x2}}, 0x0) 05:37:53 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:53 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) [ 393.616936] SELinux: policydb string length 3 does not match expected length 8 [ 393.624599] audit: type=1400 audit(1574141873.083:4518): avc: denied { prog_run } for pid=15514 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 05:37:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af", @ANYRES32], 0x2}}, 0x0) [ 393.696293] SELinux: failed to load policy 05:37:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r1, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:53 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000180)={'filter\x00', 0x97, "886402c2097e06d9d990f4577dc9c0a90d97ddc1600d01e05ec22cc2d90673babf2afdeafa7bddb60b74503fa1d1cfbebff75a1f15dd60626cbee2bdde97032425c202614ed19784c62dc1636851882c88a55e8416a882ac417504ee61d7e1e6120b1b27ce17a52f4f9d74c2fbc5846380e43aa50f5ca8eb97e438ec263e49e783b506ff64fecb68a257b788852cedc015e473b27e7b01"}, &(0x7f0000000040)=0xbb) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100060c10000300000000000000", 0x58}], 0x1) 05:37:53 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9040000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:37:53 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af", @ANYRES32], 0x2}}, 0x0) 05:37:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r1, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af", @ANYRES32], 0x2}}, 0x0) [ 394.113580] SELinux: policydb string length 4 does not match expected length 8 05:37:53 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:53 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) [ 394.188264] SELinux: failed to load policy 05:37:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9050000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:37:53 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2080, 0x0) r1 = accept$inet6(r0, 0x0, &(0x7f0000000140)) setxattr$trusted_overlay_origin(&(0x7f0000000200)='\x00', &(0x7f0000000240)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x7) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f0000000000)) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x14, 0x39, 0x100000000401}, 0x14}}, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000040)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000180)=""/118) 05:37:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b836", @ANYRES32], 0x2}}, 0x0) 05:37:53 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 05:37:53 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 394.454646] SELinux: policydb string length 5 does not match expected length 8 [ 394.530818] SELinux: failed to load policy 05:37:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) ftruncate(r3, 0x8200) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x294ad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xdf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x05', 0x175d900f) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r5, r4, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r6, 0x0, 0xedc0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r6, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0xff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x6, 0x1}, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x1, 0x3, 0xe8c0000}, &(0x7f0000000140)=0x50, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x9}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)={r7}, 0xc) getresuid(&(0x7f0000004180), 0x0, 0x0) 05:37:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b836", @ANYRES32], 0x2}}, 0x0) 05:37:54 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 05:37:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9060000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:37:54 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xedc0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b836", @ANYRES32], 0x2}}, 0x0) 05:37:54 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 394.868329] SELinux: policydb string length 6 does not match expected length 8 [ 394.876168] SELinux: failed to load policy 05:37:54 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 05:37:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5", @ANYRES32], 0x2}}, 0x0) [ 395.017279] nbd_handle_cmd: 30 callbacks suppressed [ 395.017295] block nbd2: Attempted send on invalid socket [ 395.028077] print_req_error: 30 callbacks suppressed [ 395.028087] print_req_error: I/O error, dev nbd2, sector 0 [ 395.047249] block nbd2: Attempted send on invalid socket [ 395.053226] print_req_error: I/O error, dev nbd2, sector 8 [ 395.060046] f2fs_msg: 31 callbacks suppressed [ 395.060097] F2FS-fs (nbd2): Unable to read 2th superblock [ 395.078304] block nbd2: Attempted send on invalid socket [ 395.083814] print_req_error: I/O error, dev nbd2, sector 0 [ 395.090181] F2FS-fs (nbd2): Unable to read 1th superblock [ 395.095938] block nbd2: Attempted send on invalid socket [ 395.101724] print_req_error: I/O error, dev nbd2, sector 8 05:37:54 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 395.113924] F2FS-fs (nbd2): Unable to read 2th superblock 05:37:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0}}], 0x400000000000220, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000001f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) eventfd(0x7fffffff) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x4048000) recvmmsg(r1, &(0x7f0000003180)=[{{&(0x7f0000000140)=@l2, 0x80, &(0x7f0000001c40)=[{&(0x7f00000002c0)=""/135, 0x87}, {&(0x7f0000000b00)=""/133, 0x85}, {0x0}, {&(0x7f0000001bc0)=""/68, 0x44}], 0x4, &(0x7f0000001cc0)=""/125, 0x7d}, 0x40}], 0x1, 0x0, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) fstat(r2, &(0x7f0000000080)) socket$inet6_udp(0xa, 0x2, 0x0) stat(0x0, &(0x7f00000003c0)) r3 = socket(0x2000000000000021, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) socketpair(0x8000000000001e, 0x0, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="c0870000", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000100)={0x0, 0x0, 0xc6995f0357f5a579, 0x0, 0x0, 0x0, 0x0, 0x0, r7}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000840)={0x0, 0xf9, "9e20d1c47520aff62aef112d2b86917df7b3fdac23049197761fc2bd6badb86495afec0a0455f24d47d5d29b5ca3dcd3809cd668b71f9a118bbf27be3066e586f10a1485df532b2a29a6d6f1de9a00a7a3e85db3efb29d8e255c883ef68b96149f483a155aff44ac446739630c273041597f7d99edc2935777733a219f076e6eb133713c8667b0edef0c20f3136ed9c68a89f2f97d55d25e41cd5249d98e2df56621204de7e610396cf5bd319fd79fd025b49544bb808543ac16a8e7c1839998021a435637f19b95e05ace7617ed3b22dde8ee180d9dc1aca341767f5f7ae13c12a633f001e876278a55ffc4561ce45f43254cfeb8f33186bf"}, &(0x7f0000000240)=0x101) recvmmsg(r3, &(0x7f0000001f40), 0x0, 0x0, 0x0) getresgid(0x0, &(0x7f00000004c0), 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000100), 0x0) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[]) r9 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, 0x0, 0x0) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) socket$inet6_udp(0xa, 0x2, 0x0) setresgid(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 05:37:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9070000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:37:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5", @ANYRES32], 0x2}}, 0x0) 05:37:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:54 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 395.335341] SELinux: policydb string length 7 does not match expected length 8 [ 395.374876] SELinux: failed to load policy 05:37:54 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5", @ANYRES32], 0x2}}, 0x0) [ 395.458169] block nbd2: Attempted send on invalid socket [ 395.463751] print_req_error: I/O error, dev nbd2, sector 0 [ 395.470084] F2FS-fs (nbd2): Unable to read 1th superblock [ 395.484694] block nbd2: Attempted send on invalid socket [ 395.490288] print_req_error: I/O error, dev nbd2, sector 8 [ 395.497843] F2FS-fs (nbd2): Unable to read 2th superblock 05:37:55 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 05:37:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9090000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 395.594864] block nbd2: Attempted send on invalid socket [ 395.600500] print_req_error: I/O error, dev nbd2, sector 0 [ 395.607469] F2FS-fs (nbd2): Unable to read 1th superblock 05:37:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c2", @ANYRES32], 0x2}}, 0x0) [ 395.653449] block nbd2: Attempted send on invalid socket [ 395.659190] print_req_error: I/O error, dev nbd2, sector 8 [ 395.666402] F2FS-fs (nbd2): Unable to read 2th superblock 05:37:55 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 395.757533] SELinux: policydb string length 9 does not match expected length 8 [ 395.801448] SELinux: failed to load policy 05:37:55 executing program 4 (fault-call:0 fault-nth:0): syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 395.934846] FAULT_INJECTION: forcing a failure. [ 395.934846] name failslab, interval 1, probability 0, space 0, times 0 [ 395.946617] CPU: 0 PID: 16416 Comm: syz-executor.4 Not tainted 4.19.84 #0 [ 395.953564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.962931] Call Trace: [ 395.965546] dump_stack+0x197/0x210 [ 395.969203] should_fail.cold+0xa/0x1b [ 395.973140] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 395.978257] ? __mutex_lock+0x3cd/0x1300 [ 395.982333] __should_failslab+0x121/0x190 [ 395.986559] should_failslab+0x9/0x14 [ 395.990360] kmem_cache_alloc+0x47/0x700 [ 395.994487] ? __lock_acquire+0x6ee/0x49c0 [ 395.998829] __build_skb+0x3e/0x310 [ 396.002504] __napi_alloc_skb+0x1d2/0x310 [ 396.006681] napi_get_frags+0x65/0x140 [ 396.010635] tun_get_user+0x16d4/0x4c30 [ 396.014616] ? mark_held_locks+0x100/0x100 [ 396.018872] ? tun_build_skb.isra.0+0x1950/0x1950 [ 396.023714] ? tun_get+0x171/0x290 [ 396.027252] ? lock_downgrade+0x880/0x880 [ 396.031411] ? kasan_check_read+0x11/0x20 [ 396.035607] tun_chr_write_iter+0xbd/0x156 [ 396.039865] do_iter_readv_writev+0x558/0x830 [ 396.044365] ? vfs_dedupe_file_range+0x6f0/0x6f0 [ 396.049208] ? security_file_permission+0x89/0x230 [ 396.054154] ? rw_verify_area+0x118/0x360 [ 396.058406] do_iter_write+0x184/0x5f0 [ 396.062383] ? dup_iter+0x270/0x270 [ 396.066016] ? __fget+0x340/0x540 [ 396.069482] vfs_writev+0x1b3/0x2f0 [ 396.073121] ? vfs_iter_write+0xb0/0xb0 [ 396.077204] ? kasan_check_read+0x11/0x20 [ 396.081365] ? iterate_fd+0x360/0x360 [ 396.085204] ? check_preemption_disabled+0x48/0x290 [ 396.090238] ? wait_for_completion+0x440/0x440 [ 396.094966] ? __fget_light+0x1a9/0x230 [ 396.098984] do_writev+0x15e/0x370 [ 396.102533] ? vfs_writev+0x2f0/0x2f0 [ 396.106764] ? do_syscall_64+0x26/0x620 [ 396.110731] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.116084] ? do_syscall_64+0x26/0x620 [ 396.120059] __x64_sys_writev+0x75/0xb0 [ 396.124028] do_syscall_64+0xfd/0x620 [ 396.127827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.133011] RIP: 0033:0x45a4f1 [ 396.136204] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b7 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 396.155107] RSP: 002b:00007fb2a53acba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 396.162820] RAX: ffffffffffffffda RBX: 0000000000000036 RCX: 000000000045a4f1 [ 396.170082] RDX: 0000000000000001 RSI: 00007fb2a53acc00 RDI: 00000000000000f0 [ 396.177340] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 396.185470] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fb2a53ad6d4 [ 396.192730] R13: 00000000004c9cb0 R14: 00000000004e18e0 R15: 0000000000000003 05:37:55 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 05:37:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9100000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:37:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c2", @ANYRES32], 0x2}}, 0x0) 05:37:55 executing program 4 (fault-call:0 fault-nth:1): syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x9) getgroups(0x0, &(0x7f0000000100)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r5, &(0x7f0000001700)=ANY=[@ANYBLOB="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"/526], 0x12e) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x9) getgroups(0x7, &(0x7f0000000100)=[0xee00, 0xee00, 0x0, 0x0, r7, 0xffffffffffffffff, 0xee01]) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x9) r10 = socket$inet6(0xa, 0x2, 0x0) r11 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r11, r10, 0x0) connect$inet6(r10, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r12 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r10, r12, 0x0, 0xedc0) ioctl$ASHMEM_SET_NAME(r12, 0x41007701, &(0x7f0000000040)='{%eth1vmnet0\x00') getgroups(0x5, &(0x7f0000000100)=[0xee00, 0x0, 0xffffffffffffffff, r9, 0xee01]) lsetxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="02000000010004000000000002000000", @ANYRES32=r0, @ANYBLOB="040000000000000008000600", @ANYRES32=r2, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r4, @ANYBLOB='\f\x00\x00\x00', @ANYRES32=r7, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r9, @ANYBLOB="10000400000000002000060000000000"], 0x4c, 0x0) getuid() sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000002b00050ad25a80648c6356c11224fc0010000b400400040005", 0x1d}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) [ 396.410767] FAULT_INJECTION: forcing a failure. [ 396.410767] name failslab, interval 1, probability 0, space 0, times 0 [ 396.422201] CPU: 1 PID: 16430 Comm: syz-executor.4 Not tainted 4.19.84 #0 [ 396.426100] SELinux: policydb string length 16 does not match expected length 8 [ 396.429142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.429157] Call Trace: [ 396.429185] dump_stack+0x197/0x210 [ 396.429213] should_fail.cold+0xa/0x1b [ 396.429236] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 396.449318] SELinux: failed to load policy [ 396.452514] ? __nf_conntrack_find_get+0xe45/0x1960 [ 396.452542] __should_failslab+0x121/0x190 [ 396.474976] should_failslab+0x9/0x14 [ 396.478793] kmem_cache_alloc+0x47/0x700 [ 396.482863] ? kasan_check_read+0x11/0x20 [ 396.487036] __nf_conntrack_alloc+0xdb/0x680 [ 396.491639] init_conntrack+0xfd4/0x1340 [ 396.495716] ? nf_conntrack_alloc+0x50/0x50 [ 396.500053] ? __nf_conntrack_confirm+0x31e0/0x31e0 [ 396.505091] nf_conntrack_in+0x98b/0xe90 [ 396.509184] ? nf_conntrack_update+0x990/0x990 [ 396.513849] ? __do_replace+0x856/0x910 [ 396.513881] ipv4_conntrack_in+0x61/0x90 [ 396.521966] nf_hook_slow+0xbc/0x1e0 [ 396.522025] ip_rcv+0x237/0x3f0 [ 396.528976] ? ip_local_deliver+0x520/0x520 [ 396.533325] ? ip_rcv_finish_core.isra.0+0x1af0/0x1af0 [ 396.538623] ? ip_local_deliver+0x520/0x520 [ 396.542966] __netif_receive_skb_one_core+0x113/0x1a0 [ 396.548176] ? __netif_receive_skb_core+0x3570/0x3570 [ 396.553387] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.558944] ? check_preemption_disabled+0x48/0x290 [ 396.563977] ? lock_acquire+0x16f/0x3f0 [ 396.567977] __netif_receive_skb+0x2c/0x1d0 [ 396.572315] netif_receive_skb_internal+0x117/0x700 [ 396.577429] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 396.582992] ? dev_cpu_dead+0x920/0x920 [ 396.587059] ? eth_gro_receive+0x8a0/0x8a0 [ 396.591319] napi_gro_frags+0x602/0xa20 [ 396.595308] tun_get_user+0x2f08/0x4c30 [ 396.600260] ? mark_held_locks+0x100/0x100 [ 396.604558] ? tun_build_skb.isra.0+0x1950/0x1950 [ 396.609413] ? tun_get+0x171/0x290 [ 396.612978] ? lock_downgrade+0x880/0x880 [ 396.616405] block nbd2: Attempted send on invalid socket [ 396.617150] ? kasan_check_read+0x11/0x20 [ 396.622641] print_req_error: I/O error, dev nbd2, sector 0 [ 396.626746] tun_chr_write_iter+0xbd/0x156 [ 396.634776] F2FS-fs (nbd2): Unable to read 1th superblock [ 396.636590] do_iter_readv_writev+0x558/0x830 [ 396.636613] ? vfs_dedupe_file_range+0x6f0/0x6f0 [ 396.636639] ? security_file_permission+0x89/0x230 [ 396.636657] ? rw_verify_area+0x118/0x360 [ 396.660737] do_iter_write+0x184/0x5f0 [ 396.664626] ? dup_iter+0x270/0x270 [ 396.668251] ? __fget+0x340/0x540 [ 396.668273] vfs_writev+0x1b3/0x2f0 [ 396.668287] ? vfs_iter_write+0xb0/0xb0 [ 396.668300] ? kasan_check_read+0x11/0x20 [ 396.683727] ? iterate_fd+0x360/0x360 [ 396.687549] ? check_preemption_disabled+0x48/0x290 [ 396.692579] ? wait_for_completion+0x440/0x440 [ 396.695698] block nbd2: Attempted send on invalid socket [ 396.697174] ? __fget_light+0x1a9/0x230 [ 396.697199] do_writev+0x15e/0x370 [ 396.697217] ? vfs_writev+0x2f0/0x2f0 [ 396.702697] print_req_error: I/O error, dev nbd2, sector 8 [ 396.706632] ? do_syscall_64+0x26/0x620 [ 396.711525] F2FS-fs (nbd2): Unable to read 2th superblock [ 396.714124] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.714141] ? do_syscall_64+0x26/0x620 [ 396.714165] __x64_sys_writev+0x75/0xb0 [ 396.714183] do_syscall_64+0xfd/0x620 [ 396.714203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.714215] RIP: 0033:0x45a4f1 [ 396.714231] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b7 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 396.741349] hid-generic 0000:0000:20000000.0004: ignoring exceeding usage max [ 396.743542] RSP: 002b:00007fb2a53acba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 396.743559] RAX: ffffffffffffffda RBX: 0000000000000036 RCX: 000000000045a4f1 [ 396.743568] RDX: 0000000000000001 RSI: 00007fb2a53acc00 RDI: 00000000000000f0 [ 396.743579] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 05:37:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c2", @ANYRES32], 0x2}}, 0x0) 05:37:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf92e0000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 396.743591] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fb2a53ad6d4 [ 396.818856] R13: 00000000004c9cb0 R14: 00000000004e18e0 R15: 0000000000000003 [ 396.827932] net_ratelimit: 16 callbacks suppressed [ 396.827940] protocol 88fb is buggy, dev hsr_slave_0 [ 396.834257] protocol 88fb is buggy, dev hsr_slave_0 [ 396.837996] protocol 88fb is buggy, dev hsr_slave_1 [ 396.842994] protocol 88fb is buggy, dev hsr_slave_1 05:37:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226", @ANYRES32], 0x2}}, 0x0) [ 396.880507] hid-generic 0000:0000:20000000.0004: hidraw0: HID v0.00 Device [syz1] on sz1 [ 396.898982] SELinux: policydb string length 46 does not match expected length 8 [ 396.901515] F2FS-fs (nbd2): Unable to read 1th superblock [ 396.922222] SELinux: failed to load policy 05:37:56 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 05:37:56 executing program 4 (fault-call:0 fault-nth:2): syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226", @ANYRES32], 0x2}}, 0x0) [ 397.064778] hid-generic 0000:0000:20000000.0005: ignoring exceeding usage max 05:37:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf92f0000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 397.121318] hid-generic 0000:0000:20000000.0005: hidraw0: HID v0.00 Device [syz1] on sz1 05:37:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 397.213629] FAULT_INJECTION: forcing a failure. [ 397.213629] name failslab, interval 1, probability 0, space 0, times 0 [ 397.224938] CPU: 0 PID: 16670 Comm: syz-executor.4 Not tainted 4.19.84 #0 [ 397.231887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.241268] Call Trace: [ 397.243887] dump_stack+0x197/0x210 [ 397.247546] should_fail.cold+0xa/0x1b [ 397.251456] ? mark_held_locks+0x100/0x100 [ 397.255715] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 397.260848] ? perf_trace_lock_acquire+0xf5/0x580 [ 397.265721] __should_failslab+0x121/0x190 [ 397.269969] should_failslab+0x9/0x14 [ 397.273782] __kmalloc_track_caller+0x6d/0x750 [ 397.278388] ? lock_downgrade+0x880/0x880 [ 397.282547] ? nf_ct_ext_add+0x2a9/0x62f [ 397.286626] __krealloc+0x71/0xc0 [ 397.290106] nf_ct_ext_add+0x2a9/0x62f [ 397.294014] init_conntrack+0x5f4/0x1340 [ 397.298089] ? nf_conntrack_alloc+0x50/0x50 [ 397.302432] ? __nf_conntrack_confirm+0x31e0/0x31e0 [ 397.307468] nf_conntrack_in+0x98b/0xe90 05:37:56 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r2, r1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r3, 0x0, 0xedc0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x1, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r5, r4, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r6, 0x0, 0xedc0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) fstat(r7, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000240)=0x400) setgid(r8) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r9, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="fa69dd", @ANYRES32=0x0], &(0x7f00000000c0)=0x8) r10 = syz_open_procfs(0x0, &(0x7f0000000600)='net/fib_trie\x00') ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r10, 0xc008551c, 0x0) preadv(r10, &(0x7f00000017c0), 0x199, 0x0) r11 = fcntl$dupfd(r9, 0xe09, r10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) r12 = syz_open_procfs(0x0, &(0x7f0000000600)='net/fib_trie\x00') ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r12, 0xc008551c, 0x0) preadv(r12, &(0x7f00000017c0), 0x199, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r12, 0x5380) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$FUSE_INIT(r0, 0x0, 0x0) bind(r11, &(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) pipe(&(0x7f0000000200)={0xffffffffffffffff}) fchownat(r13, &(0x7f0000000000)='./file0//ile0\x00', 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x100) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000001c0)={0x283, 0x5, 0x0, {0x0, 0x0, 0x0, 0xfffffffa}}, 0xfffffffffffffd2a) r14 = dup(0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r14, 0x4c80, 0x0) 05:37:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226", @ANYRES32], 0x2}}, 0x0) 05:37:56 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 397.311553] ? nf_conntrack_update+0x990/0x990 [ 397.316146] ? __do_replace+0x856/0x910 [ 397.320159] ipv4_conntrack_in+0x61/0x90 [ 397.324235] nf_hook_slow+0xbc/0x1e0 [ 397.327999] ip_rcv+0x237/0x3f0 [ 397.331292] ? ip_local_deliver+0x520/0x520 [ 397.335630] ? ip_rcv_finish_core.isra.0+0x1af0/0x1af0 [ 397.340923] ? ip_local_deliver+0x520/0x520 [ 397.345250] __netif_receive_skb_one_core+0x113/0x1a0 [ 397.350451] ? __netif_receive_skb_core+0x3570/0x3570 [ 397.355650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.361206] ? check_preemption_disabled+0x48/0x290 [ 397.366236] ? lock_acquire+0x16f/0x3f0 [ 397.370234] __netif_receive_skb+0x2c/0x1d0 [ 397.374574] netif_receive_skb_internal+0x117/0x700 [ 397.379601] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 397.385145] ? dev_cpu_dead+0x920/0x920 [ 397.389133] ? eth_gro_receive+0x8a0/0x8a0 [ 397.393460] napi_gro_frags+0x602/0xa20 [ 397.397428] tun_get_user+0x2f08/0x4c30 [ 397.401400] ? mark_held_locks+0x100/0x100 [ 397.405651] ? tun_build_skb.isra.0+0x1950/0x1950 [ 397.410596] ? tun_get+0x171/0x290 [ 397.414144] ? lock_downgrade+0x880/0x880 [ 397.418297] ? kasan_check_read+0x11/0x20 [ 397.422462] tun_chr_write_iter+0xbd/0x156 [ 397.426742] do_iter_readv_writev+0x558/0x830 [ 397.431330] ? vfs_dedupe_file_range+0x6f0/0x6f0 [ 397.436097] ? security_file_permission+0x89/0x230 [ 397.441028] ? rw_verify_area+0x118/0x360 [ 397.445173] do_iter_write+0x184/0x5f0 [ 397.449063] ? dup_iter+0x270/0x270 [ 397.452763] ? __fget+0x340/0x540 [ 397.456210] vfs_writev+0x1b3/0x2f0 [ 397.459837] ? vfs_iter_write+0xb0/0xb0 [ 397.463815] ? kasan_check_read+0x11/0x20 [ 397.467977] ? iterate_fd+0x360/0x360 [ 397.471779] ? check_preemption_disabled+0x48/0x290 [ 397.476806] ? wait_for_completion+0x440/0x440 [ 397.481389] ? __fget_light+0x1a9/0x230 [ 397.485356] do_writev+0x15e/0x370 [ 397.488897] ? vfs_writev+0x2f0/0x2f0 [ 397.492701] ? do_syscall_64+0x26/0x620 [ 397.496664] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 397.502020] ? do_syscall_64+0x26/0x620 [ 397.505990] __x64_sys_writev+0x75/0xb0 [ 397.509966] do_syscall_64+0xfd/0x620 [ 397.513786] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 397.518983] RIP: 0033:0x45a4f1 [ 397.522195] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b7 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 397.541093] RSP: 002b:00007fb2a53acba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 397.548800] RAX: ffffffffffffffda RBX: 0000000000000036 RCX: 000000000045a4f1 [ 397.556158] RDX: 0000000000000001 RSI: 00007fb2a53acc00 RDI: 00000000000000f0 [ 397.563414] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 397.570677] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fb2a53ad6d4 [ 397.577954] R13: 00000000004c9cb0 R14: 00000000004e18e0 R15: 0000000000000003 [ 397.586367] protocol 88fb is buggy, dev hsr_slave_0 [ 397.591823] protocol 88fb is buggy, dev hsr_slave_1 [ 397.643749] SELinux: policydb string length 47 does not match expected length 8 05:37:57 executing program 4 (fault-call:0 fault-nth:3): syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 397.694718] SELinux: failed to load policy 05:37:57 executing program 5 (fault-call:1 fault-nth:0): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 397.845905] FAULT_INJECTION: forcing a failure. [ 397.845905] name failslab, interval 1, probability 0, space 0, times 0 [ 397.857839] CPU: 0 PID: 16791 Comm: syz-executor.4 Not tainted 4.19.84 #0 [ 397.864792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.874250] Call Trace: [ 397.876881] dump_stack+0x197/0x210 [ 397.880557] should_fail.cold+0xa/0x1b [ 397.884478] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 397.889619] __should_failslab+0x121/0x190 05:37:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9580000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 397.893910] should_failslab+0x9/0x14 [ 397.897734] kmem_cache_alloc_node+0x56/0x710 [ 397.902265] __alloc_skb+0xd5/0x5f0 [ 397.905919] ? skb_scrub_packet+0x490/0x490 [ 397.910361] __ip_append_data.isra.0+0x1e6a/0x2610 [ 397.915306] ? ip_route_output_key_hash+0x242/0x380 [ 397.920347] ? ip_setup_cork+0x870/0x870 [ 397.924433] ? kasan_check_read+0x11/0x20 [ 397.928605] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 397.934332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.939973] ? ipv4_mtu+0x2a9/0x400 05:37:57 executing program 3 (fault-call:0 fault-nth:0): syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 397.943617] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 397.949172] ? ip_setup_cork+0x870/0x870 [ 397.953249] ip_append_data.part.0+0xf9/0x180 [ 397.957785] ip_send_unicast_reply+0x91a/0x11ba [ 397.962478] ? ip_make_skb+0x2c0/0x2c0 [ 397.966486] ? xfrm_policy_lookup+0x51/0x90 [ 397.970829] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 397.975869] ? map_id_range_down+0x1ee/0x370 [ 397.981249] ? __put_user_ns+0x70/0x70 [ 397.985143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.990694] ? check_preemption_disabled+0x48/0x290 [ 397.995728] ? lock_acquire+0x16f/0x3f0 [ 397.999715] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.005339] tcp_v4_send_reset+0xeeb/0x2040 [ 398.009675] ? tcp_v4_send_reset+0xeeb/0x2040 [ 398.014194] ? tcp_v4_syn_recv_sock+0x1040/0x1040 [ 398.019064] ? __lock_is_held+0xb6/0x140 [ 398.023218] ? memcpy+0x46/0x50 [ 398.026508] tcp_v4_rcv+0x2006/0x37b0 [ 398.030318] ? tcp_v4_rcv+0x2006/0x37b0 [ 398.034307] ? tcp_v4_early_demux+0x8f0/0x8f0 [ 398.038803] ip_local_deliver_finish+0x27e/0xc20 [ 398.043550] ip_local_deliver+0x1e9/0x520 [ 398.047697] ? ip_call_ra_chain+0x5c0/0x5c0 [ 398.052041] ? ip_sublist_rcv_finish+0x310/0x310 [ 398.056816] ip_rcv_finish+0x1d9/0x2e0 [ 398.060723] ip_rcv+0xe8/0x3f0 [ 398.063920] ? ip_local_deliver+0x520/0x520 [ 398.068236] ? ip_rcv_finish_core.isra.0+0x1af0/0x1af0 [ 398.073616] ? ip_local_deliver+0x520/0x520 [ 398.078023] __netif_receive_skb_one_core+0x113/0x1a0 [ 398.083221] ? __netif_receive_skb_core+0x3570/0x3570 [ 398.088415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.093984] ? check_preemption_disabled+0x48/0x290 [ 398.099034] ? lock_acquire+0x16f/0x3f0 [ 398.103007] __netif_receive_skb+0x2c/0x1d0 [ 398.107323] netif_receive_skb_internal+0x117/0x700 [ 398.112345] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 398.117885] ? dev_cpu_dead+0x920/0x920 [ 398.122037] ? eth_gro_receive+0x8a0/0x8a0 [ 398.126306] napi_gro_frags+0x602/0xa20 [ 398.128054] protocol 88fb is buggy, dev hsr_slave_0 [ 398.130291] tun_get_user+0x2f08/0x4c30 [ 398.135336] protocol 88fb is buggy, dev hsr_slave_1 [ 398.139262] ? mark_held_locks+0x100/0x100 [ 398.139290] ? tun_build_skb.isra.0+0x1950/0x1950 [ 398.139304] ? tun_get+0x171/0x290 [ 398.139331] ? lock_downgrade+0x880/0x880 [ 398.161188] ? kasan_check_read+0x11/0x20 [ 398.165348] tun_chr_write_iter+0xbd/0x156 [ 398.169579] do_iter_readv_writev+0x558/0x830 [ 398.174067] ? vfs_dedupe_file_range+0x6f0/0x6f0 [ 398.178822] ? security_file_permission+0x89/0x230 [ 398.183741] ? rw_verify_area+0x118/0x360 [ 398.187879] do_iter_write+0x184/0x5f0 [ 398.191762] ? dup_iter+0x270/0x270 [ 398.195378] ? __fget+0x340/0x540 [ 398.198841] vfs_writev+0x1b3/0x2f0 [ 398.202467] ? vfs_iter_write+0xb0/0xb0 [ 398.206442] ? kasan_check_read+0x11/0x20 [ 398.210583] ? iterate_fd+0x360/0x360 [ 398.214374] ? check_preemption_disabled+0x48/0x290 [ 398.219441] ? wait_for_completion+0x440/0x440 [ 398.224139] ? __fget_light+0x1a9/0x230 [ 398.228122] do_writev+0x15e/0x370 [ 398.231654] ? vfs_writev+0x2f0/0x2f0 [ 398.235448] ? do_syscall_64+0x26/0x620 [ 398.239427] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 398.244779] ? do_syscall_64+0x26/0x620 [ 398.248867] __x64_sys_writev+0x75/0xb0 [ 398.252836] do_syscall_64+0xfd/0x620 [ 398.256633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 398.261855] RIP: 0033:0x45a4f1 [ 398.265040] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b7 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 398.283933] RSP: 002b:00007fb2a53acba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 398.291640] RAX: ffffffffffffffda RBX: 0000000000000036 RCX: 000000000045a4f1 [ 398.298900] RDX: 0000000000000001 RSI: 00007fb2a53acc00 RDI: 00000000000000f0 [ 398.306165] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 398.313424] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fb2a53ad6d4 [ 398.320687] R13: 00000000004c9cb0 R14: 00000000004e18e0 R15: 0000000000000003 [ 398.328713] protocol 88fb is buggy, dev hsr_slave_0 [ 398.334044] protocol 88fb is buggy, dev hsr_slave_1 05:37:57 executing program 4 (fault-call:0 fault-nth:4): syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 398.387360] FAULT_INJECTION: forcing a failure. [ 398.387360] name failslab, interval 1, probability 0, space 0, times 0 [ 398.452314] CPU: 1 PID: 16794 Comm: syz-executor.5 Not tainted 4.19.84 #0 [ 398.459322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 398.468701] Call Trace: [ 398.469951] SELinux: policydb string length 88 does not match expected length 8 [ 398.471316] dump_stack+0x197/0x210 [ 398.471350] should_fail.cold+0xa/0x1b [ 398.471371] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 398.471393] ? lock_downgrade+0x880/0x880 [ 398.495794] __should_failslab+0x121/0x190 [ 398.500039] should_failslab+0x9/0x14 [ 398.503845] kmem_cache_alloc_node+0x26c/0x710 [ 398.508440] __alloc_skb+0xd5/0x5f0 [ 398.512069] ? skb_scrub_packet+0x490/0x490 [ 398.516396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.521941] ? netlink_autobind.isra.0+0x228/0x310 [ 398.526880] netlink_sendmsg+0x97b/0xd70 [ 398.530954] ? netlink_unicast+0x720/0x720 [ 398.535201] ? selinux_socket_sendmsg+0x36/0x40 [ 398.539873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.545416] ? security_socket_sendmsg+0x8d/0xc0 [ 398.550175] ? netlink_unicast+0x720/0x720 [ 398.554490] sock_sendmsg+0xd7/0x130 [ 398.558210] ___sys_sendmsg+0x803/0x920 [ 398.562192] ? copy_msghdr_from_user+0x430/0x430 [ 398.567043] ? lock_downgrade+0x880/0x880 [ 398.571201] ? kasan_check_read+0x11/0x20 [ 398.575352] ? __fget+0x367/0x540 [ 398.578809] ? iterate_fd+0x360/0x360 [ 398.582623] ? __fget_light+0x1a9/0x230 [ 398.586599] ? __fdget+0x1b/0x20 [ 398.589967] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 398.595512] __sys_sendmsg+0x105/0x1d0 [ 398.599406] ? __ia32_sys_shutdown+0x80/0x80 [ 398.603852] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 398.608609] ? do_syscall_64+0x26/0x620 [ 398.612586] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 398.617949] ? do_syscall_64+0x26/0x620 [ 398.621930] __x64_sys_sendmsg+0x78/0xb0 [ 398.627384] do_syscall_64+0xfd/0x620 [ 398.631189] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 398.636381] RIP: 0033:0x45a639 [ 398.639577] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 398.658485] RSP: 002b:00007fd89c896c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 398.666199] RAX: ffffffffffffffda RBX: 00007fd89c896c90 RCX: 000000000045a639 [ 398.673463] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 398.680739] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 398.688004] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd89c8976d4 [ 398.695272] R13: 00000000004c8b62 R14: 00000000004df168 R15: 0000000000000004 [ 398.725953] SELinux: failed to load policy [ 398.730239] FAULT_INJECTION: forcing a failure. [ 398.730239] name failslab, interval 1, probability 0, space 0, times 0 [ 398.730265] CPU: 1 PID: 16806 Comm: syz-executor.3 Not tainted 4.19.84 #0 [ 398.730275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 398.730280] Call Trace: [ 398.730305] dump_stack+0x197/0x210 [ 398.730337] should_fail.cold+0xa/0x1b [ 398.730361] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 398.730378] ? __mutex_lock+0x3cd/0x1300 [ 398.730404] __should_failslab+0x121/0x190 [ 398.730420] should_failslab+0x9/0x14 [ 398.730434] kmem_cache_alloc+0x47/0x700 [ 398.730452] ? __lock_acquire+0x6ee/0x49c0 [ 398.730485] __build_skb+0x3e/0x310 [ 398.730503] __napi_alloc_skb+0x1d2/0x310 [ 398.730525] napi_get_frags+0x65/0x140 [ 398.730548] tun_get_user+0x16d4/0x4c30 [ 398.730576] ? mark_held_locks+0x100/0x100 [ 398.813412] ? tun_build_skb.isra.0+0x1950/0x1950 [ 398.818278] ? tun_get+0x171/0x290 [ 398.821850] ? lock_downgrade+0x880/0x880 [ 398.826022] ? kasan_check_read+0x11/0x20 [ 398.830196] tun_chr_write_iter+0xbd/0x156 [ 398.834446] do_iter_readv_writev+0x558/0x830 [ 398.838982] ? vfs_dedupe_file_range+0x6f0/0x6f0 [ 398.843759] ? security_file_permission+0x89/0x230 [ 398.848713] ? rw_verify_area+0x118/0x360 [ 398.852881] do_iter_write+0x184/0x5f0 [ 398.856788] ? dup_iter+0x270/0x270 [ 398.860429] ? __fget+0x340/0x540 [ 398.863906] vfs_writev+0x1b3/0x2f0 [ 398.867551] ? vfs_iter_write+0xb0/0xb0 [ 398.871617] ? kasan_check_read+0x11/0x20 05:37:58 executing program 5 (fault-call:1 fault-nth:1): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:37:58 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000020045204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 398.875803] ? iterate_fd+0x360/0x360 [ 398.879623] ? check_preemption_disabled+0x48/0x290 [ 398.884657] ? wait_for_completion+0x440/0x440 [ 398.889253] ? __fget_light+0x1a9/0x230 [ 398.889274] do_writev+0x15e/0x370 [ 398.889290] ? vfs_writev+0x2f0/0x2f0 [ 398.889311] ? do_syscall_64+0x26/0x620 [ 398.896805] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 398.896824] ? do_syscall_64+0x26/0x620 [ 398.896848] __x64_sys_writev+0x75/0xb0 [ 398.918006] do_syscall_64+0xfd/0x620 [ 398.921824] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 398.921838] RIP: 0033:0x45a4f1 [ 398.921854] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b7 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 398.921862] RSP: 002b:00007ffb6e007ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 398.921879] RAX: ffffffffffffffda RBX: 0000000000000036 RCX: 000000000045a4f1 [ 398.921888] RDX: 0000000000000001 RSI: 00007ffb6e007c00 RDI: 00000000000000f0 [ 398.921897] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 398.921906] R10: 0000000000000064 R11: 0000000000000293 R12: 00007ffb6e0086d4 [ 398.921915] R13: 00000000004c9cb0 R14: 00000000004e18e0 R15: 0000000000000003 [ 399.028158] FAULT_INJECTION: forcing a failure. [ 399.028158] name failslab, interval 1, probability 0, space 0, times 0 [ 399.079114] SELinux: policydb string length 33554440 does not match expected length 8 [ 399.087536] SELinux: failed to load policy [ 399.138457] CPU: 0 PID: 16912 Comm: syz-executor.5 Not tainted 4.19.84 #0 [ 399.145455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.154848] Call Trace: [ 399.157462] dump_stack+0x197/0x210 [ 399.161143] should_fail.cold+0xa/0x1b [ 399.165066] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 399.170196] ? lock_downgrade+0x880/0x880 [ 399.174374] __should_failslab+0x121/0x190 [ 399.178627] should_failslab+0x9/0x14 [ 399.182440] kmem_cache_alloc_node_trace+0x274/0x720 [ 399.187573] ? __alloc_skb+0xd5/0x5f0 [ 399.191400] __kmalloc_node_track_caller+0x3d/0x80 [ 399.196351] __kmalloc_reserve.isra.0+0x40/0xf0 [ 399.201044] __alloc_skb+0x10b/0x5f0 [ 399.204777] ? skb_scrub_packet+0x490/0x490 [ 399.209117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.214673] ? netlink_autobind.isra.0+0x228/0x310 [ 399.219626] netlink_sendmsg+0x97b/0xd70 [ 399.223706] ? netlink_unicast+0x720/0x720 [ 399.227966] ? selinux_socket_sendmsg+0x36/0x40 [ 399.232647] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.238202] ? security_socket_sendmsg+0x8d/0xc0 [ 399.242965] ? netlink_unicast+0x720/0x720 [ 399.247220] sock_sendmsg+0xd7/0x130 [ 399.250929] ___sys_sendmsg+0x803/0x920 [ 399.254900] ? copy_msghdr_from_user+0x430/0x430 [ 399.259656] ? lock_downgrade+0x880/0x880 [ 399.263812] ? kasan_check_read+0x11/0x20 [ 399.267959] ? __fget+0x367/0x540 [ 399.271407] ? iterate_fd+0x360/0x360 [ 399.275220] ? __fget_light+0x1a9/0x230 [ 399.279646] ? __fdget+0x1b/0x20 [ 399.283005] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 399.288546] __sys_sendmsg+0x105/0x1d0 [ 399.292457] ? __ia32_sys_shutdown+0x80/0x80 [ 399.296886] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 399.301636] ? do_syscall_64+0x26/0x620 [ 399.305609] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 399.310986] ? do_syscall_64+0x26/0x620 [ 399.314967] __x64_sys_sendmsg+0x78/0xb0 [ 399.319028] do_syscall_64+0xfd/0x620 [ 399.322833] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 399.328020] RIP: 0033:0x45a639 [ 399.331211] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 399.350117] RSP: 002b:00007fd89c896c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 399.357822] RAX: ffffffffffffffda RBX: 00007fd89c896c90 RCX: 000000000045a639 [ 399.365081] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 399.372338] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 399.379600] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd89c8976d4 [ 399.386862] R13: 00000000004c8b62 R14: 00000000004df168 R15: 0000000000000004 05:37:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:37:58 executing program 3 (fault-call:0 fault-nth:1): syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:58 executing program 4: syz_emit_ethernet(0xd, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:37:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000040045204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:37:58 executing program 5 (fault-call:1 fault-nth:2): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:37:59 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r2, r1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r3, 0x0, 0xedc0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x1, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r5, r4, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r6, 0x0, 0xedc0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) fstat(r7, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000240)=0x400) setgid(r8) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r9, &(0x7f0000aaff09)="b8", 0x1, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="fa69dd", @ANYRES32=0x0], &(0x7f00000000c0)=0x8) r10 = syz_open_procfs(0x0, &(0x7f0000000600)='net/fib_trie\x00') ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r10, 0xc008551c, 0x0) preadv(r10, &(0x7f00000017c0), 0x199, 0x0) r11 = fcntl$dupfd(r9, 0xe09, r10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) r12 = syz_open_procfs(0x0, &(0x7f0000000600)='net/fib_trie\x00') ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r12, 0xc008551c, 0x0) preadv(r12, &(0x7f00000017c0), 0x199, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r12, 0x5380) rmdir(&(0x7f0000000340)='./file0//ile0\x00') write$FUSE_INIT(r0, 0x0, 0x0) bind(r11, &(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) pipe(&(0x7f0000000200)={0xffffffffffffffff}) fchownat(r13, &(0x7f0000000000)='./file0//ile0\x00', 0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x100) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000001c0)={0x283, 0x5, 0x0, {0x0, 0x0, 0x0, 0xfffffffa}}, 0xfffffffffffffd2a) r14 = dup(0xffffffffffffffff) ioctl$LOOP_CTL_ADD(r14, 0x4c80, 0x0) [ 399.540043] SELinux: policydb string length 67108872 does not match expected length 8 [ 399.540313] FAULT_INJECTION: forcing a failure. [ 399.540313] name failslab, interval 1, probability 0, space 0, times 0 [ 399.559591] CPU: 0 PID: 17036 Comm: syz-executor.3 Not tainted 4.19.84 #0 [ 399.566534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.568011] SELinux: failed to load policy [ 399.575980] Call Trace: [ 399.576007] dump_stack+0x197/0x210 [ 399.576032] should_fail.cold+0xa/0x1b [ 399.576053] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 399.595455] ? __nf_conntrack_find_get+0xe45/0x1960 [ 399.600515] __should_failslab+0x121/0x190 [ 399.604770] should_failslab+0x9/0x14 [ 399.608580] kmem_cache_alloc+0x47/0x700 [ 399.612649] ? kasan_check_read+0x11/0x20 [ 399.616826] __nf_conntrack_alloc+0xdb/0x680 [ 399.621341] init_conntrack+0xfd4/0x1340 [ 399.625419] ? nf_conntrack_alloc+0x50/0x50 [ 399.629757] ? __nf_conntrack_confirm+0x31e0/0x31e0 [ 399.634792] nf_conntrack_in+0x98b/0xe90 05:37:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000000145204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:37:59 executing program 4: syz_emit_ethernet(0x140, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 399.638884] ? nf_conntrack_update+0x990/0x990 [ 399.643485] ? __do_replace+0x856/0x910 [ 399.647489] ipv4_conntrack_in+0x61/0x90 [ 399.651565] nf_hook_slow+0xbc/0x1e0 [ 399.655300] ip_rcv+0x237/0x3f0 [ 399.658597] ? ip_local_deliver+0x520/0x520 [ 399.662938] ? ip_rcv_finish_core.isra.0+0x1af0/0x1af0 [ 399.668230] ? ip_local_deliver+0x520/0x520 [ 399.672561] __netif_receive_skb_one_core+0x113/0x1a0 [ 399.677884] ? __netif_receive_skb_core+0x3570/0x3570 [ 399.683211] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.688741] ? check_preemption_disabled+0x48/0x290 [ 399.693772] ? lock_acquire+0x16f/0x3f0 [ 399.697766] __netif_receive_skb+0x2c/0x1d0 [ 399.702093] netif_receive_skb_internal+0x117/0x700 [ 399.707108] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 399.712651] ? dev_cpu_dead+0x920/0x920 [ 399.716717] ? eth_gro_receive+0x8a0/0x8a0 [ 399.720950] napi_gro_frags+0x602/0xa20 [ 399.724946] tun_get_user+0x2f08/0x4c30 [ 399.728933] ? mark_held_locks+0x100/0x100 [ 399.733201] ? tun_build_skb.isra.0+0x1950/0x1950 [ 399.738054] ? tun_get+0x171/0x290 [ 399.741599] ? lock_downgrade+0x880/0x880 [ 399.745753] ? kasan_check_read+0x11/0x20 [ 399.749978] tun_chr_write_iter+0xbd/0x156 [ 399.754206] do_iter_readv_writev+0x558/0x830 [ 399.758708] ? vfs_dedupe_file_range+0x6f0/0x6f0 [ 399.763517] ? security_file_permission+0x89/0x230 [ 399.768437] ? rw_verify_area+0x118/0x360 [ 399.772588] do_iter_write+0x184/0x5f0 [ 399.776484] ? dup_iter+0x270/0x270 [ 399.780111] ? __fget+0x340/0x540 [ 399.783565] vfs_writev+0x1b3/0x2f0 [ 399.787182] ? vfs_iter_write+0xb0/0xb0 [ 399.791147] ? kasan_check_read+0x11/0x20 [ 399.795306] ? iterate_fd+0x360/0x360 [ 399.799211] ? wait_for_completion+0x440/0x440 [ 399.804836] ? __fget_light+0x1a9/0x230 [ 399.808837] do_writev+0x15e/0x370 [ 399.812391] ? vfs_writev+0x2f0/0x2f0 [ 399.816182] ? do_syscall_64+0x26/0x620 [ 399.820149] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 399.825515] ? do_syscall_64+0x26/0x620 [ 399.829493] __x64_sys_writev+0x75/0xb0 [ 399.833467] do_syscall_64+0xfd/0x620 [ 399.837266] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 399.842448] RIP: 0033:0x45a4f1 [ 399.845637] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b7 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 399.864608] RSP: 002b:00007ffb6e007ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 399.872342] RAX: ffffffffffffffda RBX: 0000000000000036 RCX: 000000000045a4f1 [ 399.879619] RDX: 0000000000000001 RSI: 00007ffb6e007c00 RDI: 00000000000000f0 [ 399.886890] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 399.894150] R10: 0000000000000064 R11: 0000000000000293 R12: 00007ffb6e0086d4 [ 399.901408] R13: 00000000004c9cb0 R14: 00000000004e18e0 R15: 0000000000000003 [ 399.948411] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 05:37:59 executing program 3 (fault-call:0 fault-nth:2): syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 399.997388] FAULT_INJECTION: forcing a failure. [ 399.997388] name failslab, interval 1, probability 0, space 0, times 0 [ 400.032919] SELinux: policydb string E Linux does not match my string SE Linux [ 400.054982] CPU: 1 PID: 17140 Comm: syz-executor.5 Not tainted 4.19.84 #0 [ 400.061975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.071344] Call Trace: [ 400.073967] dump_stack+0x197/0x210 [ 400.077646] should_fail.cold+0xa/0x1b [ 400.081559] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 400.086768] ? lock_downgrade+0x880/0x880 [ 400.089247] SELinux: failed to load policy [ 400.090948] __should_failslab+0x121/0x190 [ 400.099458] should_failslab+0x9/0x14 [ 400.103276] kmem_cache_alloc_node+0x26c/0x710 [ 400.107870] ? genl_rcv_msg+0x129/0x170 [ 400.111860] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 400.117415] __alloc_skb+0xd5/0x5f0 [ 400.121056] ? skb_scrub_packet+0x490/0x490 [ 400.125392] ? kasan_check_write+0x14/0x20 [ 400.129642] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 400.134498] netlink_ack+0x25c/0xb30 [ 400.138244] ? netlink_sendmsg+0xd70/0xd70 [ 400.142489] ? mutex_unlock+0xd/0x10 [ 400.146196] ? genl_rcv_msg+0x106/0x170 [ 400.150186] netlink_rcv_skb+0x382/0x460 [ 400.154263] ? genl_family_rcv_msg+0xd30/0xd30 [ 400.158863] ? netlink_ack+0xb30/0xb30 [ 400.162780] genl_rcv+0x29/0x40 [ 400.166077] netlink_unicast+0x537/0x720 [ 400.170157] ? netlink_attachskb+0x770/0x770 [ 400.174583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.180139] netlink_sendmsg+0x8ae/0xd70 [ 400.184224] ? netlink_unicast+0x720/0x720 [ 400.188484] ? selinux_socket_sendmsg+0x36/0x40 [ 400.193170] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.195977] FAULT_INJECTION: forcing a failure. [ 400.195977] name failslab, interval 1, probability 0, space 0, times 0 [ 400.198717] ? security_socket_sendmsg+0x8d/0xc0 [ 400.198734] ? netlink_unicast+0x720/0x720 [ 400.198753] sock_sendmsg+0xd7/0x130 [ 400.198770] ___sys_sendmsg+0x803/0x920 [ 400.198798] ? copy_msghdr_from_user+0x430/0x430 [ 400.231836] ? lock_downgrade+0x880/0x880 [ 400.236154] ? kasan_check_read+0x11/0x20 [ 400.240305] ? __fget+0x367/0x540 [ 400.243774] ? iterate_fd+0x360/0x360 [ 400.247577] ? __fget_light+0x1a9/0x230 [ 400.251550] ? __fdget+0x1b/0x20 [ 400.254909] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 400.260448] __sys_sendmsg+0x105/0x1d0 [ 400.264340] ? __ia32_sys_shutdown+0x80/0x80 [ 400.268755] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 400.273513] ? do_syscall_64+0x26/0x620 [ 400.277475] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 400.282826] ? do_syscall_64+0x26/0x620 [ 400.286792] __x64_sys_sendmsg+0x78/0xb0 [ 400.290845] do_syscall_64+0xfd/0x620 [ 400.294637] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 400.299814] RIP: 0033:0x45a639 [ 400.302996] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 400.321905] RSP: 002b:00007fd89c896c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 400.329606] RAX: ffffffffffffffda RBX: 00007fd89c896c90 RCX: 000000000045a639 [ 400.336872] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 400.344128] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 05:37:59 executing program 4: syz_emit_ethernet(0xfdef, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 400.351398] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd89c8976d4 [ 400.358670] R13: 00000000004c8b62 R14: 00000000004df168 R15: 0000000000000004 [ 400.365962] CPU: 0 PID: 17226 Comm: syz-executor.3 Not tainted 4.19.84 #0 [ 400.372905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.382274] Call Trace: [ 400.384873] dump_stack+0x197/0x210 [ 400.388525] should_fail.cold+0xa/0x1b [ 400.392428] ? mark_held_locks+0x100/0x100 [ 400.396681] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 400.401799] ? perf_trace_lock_acquire+0xf5/0x580 [ 400.406667] __should_failslab+0x121/0x190 [ 400.410920] should_failslab+0x9/0x14 [ 400.414734] __kmalloc_track_caller+0x6d/0x750 [ 400.419336] ? lock_downgrade+0x880/0x880 [ 400.423499] ? nf_ct_ext_add+0x2a9/0x62f [ 400.427576] __krealloc+0x71/0xc0 [ 400.431050] nf_ct_ext_add+0x2a9/0x62f [ 400.434956] init_conntrack+0x5f4/0x1340 [ 400.439033] ? nf_conntrack_alloc+0x50/0x50 [ 400.443369] ? __nf_conntrack_confirm+0x31e0/0x31e0 [ 400.448407] nf_conntrack_in+0x98b/0xe90 [ 400.452493] ? nf_conntrack_update+0x990/0x990 [ 400.457093] ? __do_replace+0x856/0x910 [ 400.461099] ipv4_conntrack_in+0x61/0x90 [ 400.465170] nf_hook_slow+0xbc/0x1e0 [ 400.468899] ip_rcv+0x237/0x3f0 [ 400.472187] ? ip_local_deliver+0x520/0x520 [ 400.476527] ? ip_rcv_finish_core.isra.0+0x1af0/0x1af0 [ 400.482255] ? ip_local_deliver+0x520/0x520 [ 400.486595] __netif_receive_skb_one_core+0x113/0x1a0 [ 400.491806] ? __netif_receive_skb_core+0x3570/0x3570 [ 400.497010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.502560] ? check_preemption_disabled+0x48/0x290 05:37:59 executing program 5 (fault-call:1 fault-nth:3): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000000a45204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 400.507588] ? lock_acquire+0x16f/0x3f0 [ 400.511581] __netif_receive_skb+0x2c/0x1d0 [ 400.515934] netif_receive_skb_internal+0x117/0x700 [ 400.520964] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 400.526513] ? dev_cpu_dead+0x920/0x920 [ 400.530499] ? eth_gro_receive+0x8a0/0x8a0 [ 400.534755] napi_gro_frags+0x602/0xa20 [ 400.538753] tun_get_user+0x2f08/0x4c30 [ 400.542738] ? mark_held_locks+0x100/0x100 [ 400.547001] ? tun_build_skb.isra.0+0x1950/0x1950 [ 400.551868] ? tun_get+0x171/0x290 [ 400.555434] ? lock_downgrade+0x880/0x880 [ 400.559594] ? kasan_check_read+0x11/0x20 [ 400.563773] tun_chr_write_iter+0xbd/0x156 [ 400.568023] do_iter_readv_writev+0x558/0x830 [ 400.572533] ? vfs_dedupe_file_range+0x6f0/0x6f0 [ 400.577305] ? security_file_permission+0x89/0x230 [ 400.582250] ? rw_verify_area+0x118/0x360 [ 400.586410] do_iter_write+0x184/0x5f0 [ 400.590309] ? dup_iter+0x270/0x270 [ 400.593942] ? __fget+0x340/0x540 [ 400.597412] vfs_writev+0x1b3/0x2f0 [ 400.601050] ? vfs_iter_write+0xb0/0xb0 [ 400.605042] ? kasan_check_read+0x11/0x20 [ 400.609216] ? iterate_fd+0x360/0x360 [ 400.613033] ? check_preemption_disabled+0x48/0x290 [ 400.618060] ? wait_for_completion+0x440/0x440 [ 400.622660] ? __fget_light+0x1a9/0x230 [ 400.626653] do_writev+0x15e/0x370 [ 400.630214] ? vfs_writev+0x2f0/0x2f0 [ 400.634030] ? do_syscall_64+0x26/0x620 [ 400.638011] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 400.643381] ? do_syscall_64+0x26/0x620 [ 400.647373] __x64_sys_writev+0x75/0xb0 [ 400.651361] do_syscall_64+0xfd/0x620 [ 400.655173] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 400.660358] RIP: 0033:0x45a4f1 [ 400.663537] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b7 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 400.682431] RSP: 002b:00007ffb6e007ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 400.690146] RAX: ffffffffffffffda RBX: 0000000000000036 RCX: 000000000045a4f1 [ 400.697409] RDX: 0000000000000001 RSI: 00007ffb6e007c00 RDI: 00000000000000f0 [ 400.704667] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 400.711940] R10: 0000000000000064 R11: 0000000000000293 R12: 00007ffb6e0086d4 [ 400.719217] R13: 00000000004c9cb0 R14: 00000000004e18e0 R15: 0000000000000003 05:38:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:38:00 executing program 4: syz_emit_ethernet(0x200000b6, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 400.820254] SELinux: policydb string [ 400.820254] E Linux does not match my string SE Linux 05:38:00 executing program 3 (fault-call:0 fault-nth:3): syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 400.870405] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 400.905372] SELinux: failed to load policy [ 400.924130] FAULT_INJECTION: forcing a failure. [ 400.924130] name failslab, interval 1, probability 0, space 0, times 0 05:38:00 executing program 4: syz_emit_ethernet(0x7ffff000, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:00 executing program 0: r0 = socket(0x1, 0x10000000000802, 0x0) write(r0, &(0x7f00000003c0)="fc0000002d000704ab092500090007000aab80ff0100000000003693e0000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe000000070002000000000000006c6c256f1a272f900e2e117c22efc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2c000005deef11a822c9afea7dc2add7f671fd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d09b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8", 0xfc) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r2, r1, 0x0) write(r2, &(0x7f0000000000)="310335e85f735aae8d921bccdcd4cf8bc8611e7a112a6fbfe47695be8a3622d1eeeaa9", 0x23) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r4, r3, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r5, 0x0, 0xedc0) sendmsg$TIPC_NL_PUBL_GET(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xb0, 0x0, 0x10, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x44, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5ab8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'rose0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x101}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xf8}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xc7c}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x20}, 0x10) [ 400.974945] nbd_handle_cmd: 14 callbacks suppressed [ 400.974961] block nbd2: Attempted send on invalid socket [ 400.985889] print_req_error: 14 callbacks suppressed [ 400.985900] print_req_error: I/O error, dev nbd2, sector 0 [ 400.998902] f2fs_msg: 13 callbacks suppressed [ 401.001287] F2FS-fs (nbd2): Unable to read 1th superblock [ 401.022595] CPU: 0 PID: 17272 Comm: syz-executor.5 Not tainted 4.19.84 #0 [ 401.029038] FAULT_INJECTION: forcing a failure. [ 401.029038] name failslab, interval 1, probability 0, space 0, times 0 [ 401.029561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.050120] Call Trace: [ 401.052713] dump_stack+0x197/0x210 [ 401.056344] should_fail.cold+0xa/0x1b [ 401.060235] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 401.065334] ? lock_downgrade+0x880/0x880 [ 401.069482] __should_failslab+0x121/0x190 [ 401.073710] should_failslab+0x9/0x14 [ 401.077502] kmem_cache_alloc_node_trace+0x274/0x720 [ 401.082609] ? __alloc_skb+0xd5/0x5f0 [ 401.086408] __kmalloc_node_track_caller+0x3d/0x80 [ 401.091329] __kmalloc_reserve.isra.0+0x40/0xf0 [ 401.095989] __alloc_skb+0x10b/0x5f0 [ 401.099700] ? skb_scrub_packet+0x490/0x490 [ 401.104012] ? kasan_check_write+0x14/0x20 [ 401.108250] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 401.113089] netlink_ack+0x25c/0xb30 [ 401.116795] ? netlink_sendmsg+0xd70/0xd70 [ 401.121023] ? mutex_unlock+0xd/0x10 [ 401.124738] ? genl_rcv_msg+0x106/0x170 [ 401.128705] netlink_rcv_skb+0x382/0x460 [ 401.132760] ? genl_family_rcv_msg+0xd30/0xd30 [ 401.137352] ? netlink_ack+0xb30/0xb30 [ 401.141243] genl_rcv+0x29/0x40 [ 401.144521] netlink_unicast+0x537/0x720 [ 401.148590] ? netlink_attachskb+0x770/0x770 [ 401.152991] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.158519] netlink_sendmsg+0x8ae/0xd70 [ 401.162574] ? netlink_unicast+0x720/0x720 [ 401.166804] ? selinux_socket_sendmsg+0x36/0x40 [ 401.171459] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.176986] ? security_socket_sendmsg+0x8d/0xc0 [ 401.181733] ? netlink_unicast+0x720/0x720 [ 401.185961] sock_sendmsg+0xd7/0x130 [ 401.189676] ___sys_sendmsg+0x803/0x920 [ 401.193642] ? copy_msghdr_from_user+0x430/0x430 [ 401.198398] ? lock_downgrade+0x880/0x880 [ 401.202541] ? kasan_check_read+0x11/0x20 [ 401.206683] ? __fget+0x367/0x540 [ 401.210129] ? iterate_fd+0x360/0x360 [ 401.213928] ? __fget_light+0x1a9/0x230 [ 401.217891] ? __fdget+0x1b/0x20 [ 401.221251] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 401.226785] __sys_sendmsg+0x105/0x1d0 [ 401.230667] ? __ia32_sys_shutdown+0x80/0x80 [ 401.235079] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 401.239824] ? do_syscall_64+0x26/0x620 [ 401.243787] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.249147] ? do_syscall_64+0x26/0x620 [ 401.253114] __x64_sys_sendmsg+0x78/0xb0 [ 401.257168] do_syscall_64+0xfd/0x620 [ 401.260982] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.266158] RIP: 0033:0x45a639 [ 401.269343] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 401.288256] RSP: 002b:00007fd89c896c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 401.295962] RAX: ffffffffffffffda RBX: 00007fd89c896c90 RCX: 000000000045a639 [ 401.303364] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 401.310627] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 401.317891] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd89c8976d4 [ 401.325152] R13: 00000000004c8b62 R14: 00000000004df168 R15: 0000000000000004 [ 401.332437] CPU: 1 PID: 17340 Comm: syz-executor.3 Not tainted 4.19.84 #0 [ 401.339380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.348742] Call Trace: [ 401.351348] dump_stack+0x197/0x210 [ 401.355001] should_fail.cold+0xa/0x1b [ 401.358911] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 401.364049] __should_failslab+0x121/0x190 [ 401.368301] should_failslab+0x9/0x14 [ 401.372118] kmem_cache_alloc_node+0x56/0x710 [ 401.376520] block nbd2: Attempted send on invalid socket [ 401.376636] __alloc_skb+0xd5/0x5f0 [ 401.382129] print_req_error: I/O error, dev nbd2, sector 8 [ 401.385681] ? skb_scrub_packet+0x490/0x490 [ 401.392006] F2FS-fs (nbd2): Unable to read 2th superblock [ 401.395644] __ip_append_data.isra.0+0x1e6a/0x2610 [ 401.395661] ? ip_route_output_key_hash+0x242/0x380 [ 401.395687] ? ip_setup_cork+0x870/0x870 [ 401.395704] ? kasan_check_read+0x11/0x20 [ 401.395726] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 401.395740] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.395754] ? ipv4_mtu+0x2a9/0x400 [ 401.395769] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 401.395786] ? ip_setup_cork+0x870/0x870 [ 401.395803] ip_append_data.part.0+0xf9/0x180 [ 401.395828] ip_send_unicast_reply+0x91a/0x11ba [ 401.395862] ? ip_make_skb+0x2c0/0x2c0 [ 401.429687] block nbd2: Attempted send on invalid socket [ 401.430902] ? perf_trace_lock_acquire+0xf5/0x580 [ 401.430920] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 401.434542] print_req_error: I/O error, dev nbd2, sector 0 [ 401.440065] ? map_id_range_down+0x1ee/0x370 [ 401.440080] ? __put_user_ns+0x70/0x70 [ 401.440091] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.440108] ? check_preemption_disabled+0x48/0x290 [ 401.440129] ? lock_acquire+0x16f/0x3f0 [ 401.444864] F2FS-fs (nbd2): Unable to read 1th superblock [ 401.448654] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.448681] tcp_v4_send_reset+0xeeb/0x2040 [ 401.448694] ? tcp_v4_send_reset+0xeeb/0x2040 [ 401.448719] ? tcp_v4_syn_recv_sock+0x1040/0x1040 [ 401.448744] ? __inet_lookup_listener+0x5cb/0x980 [ 401.448757] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 401.448775] ? memcpy+0x46/0x50 [ 401.448795] tcp_v4_rcv+0x2006/0x37b0 [ 401.448808] ? tcp_v4_rcv+0x2006/0x37b0 [ 401.448842] ? tcp_v4_early_demux+0x8f0/0x8f0 [ 401.448873] ip_local_deliver_finish+0x27e/0xc20 [ 401.448894] ip_local_deliver+0x1e9/0x520 [ 401.465276] block nbd2: Attempted send on invalid socket [ 401.467736] ? ip_call_ra_chain+0x5c0/0x5c0 [ 401.467759] ? ip_sublist_rcv_finish+0x310/0x310 [ 401.467785] ip_rcv_finish+0x1d9/0x2e0 [ 401.467802] ip_rcv+0xe8/0x3f0 [ 401.467818] ? ip_local_deliver+0x520/0x520 [ 401.472848] print_req_error: I/O error, dev nbd2, sector 8 [ 401.478449] ? ip_rcv_finish_core.isra.0+0x1af0/0x1af0 [ 401.478472] ? ip_local_deliver+0x520/0x520 [ 401.484801] F2FS-fs (nbd2): Unable to read 2th superblock [ 401.486746] __netif_receive_skb_one_core+0x113/0x1a0 [ 401.486768] ? __netif_receive_skb_core+0x3570/0x3570 [ 401.486785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.486804] ? check_preemption_disabled+0x48/0x290 [ 401.486820] ? lock_acquire+0x16f/0x3f0 [ 401.486842] __netif_receive_skb+0x2c/0x1d0 [ 401.486863] netif_receive_skb_internal+0x117/0x700 [ 401.486877] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 401.486894] ? dev_cpu_dead+0x920/0x920 [ 401.486912] ? eth_gro_receive+0x8a0/0x8a0 [ 401.486930] ? __sanitizer_cov_trace_switch+0x13/0x80 [ 401.659821] napi_gro_frags+0x602/0xa20 [ 401.663809] tun_get_user+0x2f08/0x4c30 [ 401.667791] ? mark_held_locks+0x100/0x100 [ 401.672059] ? tun_build_skb.isra.0+0x1950/0x1950 [ 401.676913] ? tun_get+0x171/0x290 [ 401.680472] ? lock_downgrade+0x880/0x880 [ 401.684633] ? kasan_check_read+0x11/0x20 [ 401.688798] tun_chr_write_iter+0xbd/0x156 [ 401.693043] do_iter_readv_writev+0x558/0x830 [ 401.697553] ? vfs_dedupe_file_range+0x6f0/0x6f0 [ 401.702322] ? security_file_permission+0x89/0x230 [ 401.707257] ? rw_verify_area+0x118/0x360 [ 401.711410] do_iter_write+0x184/0x5f0 [ 401.715297] ? dup_iter+0x270/0x270 [ 401.718924] ? __fget+0x340/0x540 [ 401.722385] vfs_writev+0x1b3/0x2f0 [ 401.726012] ? vfs_iter_write+0xb0/0xb0 [ 401.730004] ? kasan_check_read+0x11/0x20 [ 401.734177] ? iterate_fd+0x360/0x360 [ 401.737984] ? check_preemption_disabled+0x48/0x290 [ 401.743014] ? wait_for_completion+0x440/0x440 [ 401.747600] ? __fget_light+0x1a9/0x230 [ 401.751737] do_writev+0x15e/0x370 [ 401.755292] ? vfs_writev+0x2f0/0x2f0 [ 401.759103] ? do_syscall_64+0x26/0x620 [ 401.763172] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.769405] ? do_syscall_64+0x26/0x620 [ 401.773388] __x64_sys_writev+0x75/0xb0 [ 401.777367] do_syscall_64+0xfd/0x620 [ 401.781178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.786452] RIP: 0033:0x45a4f1 [ 401.789651] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b7 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 401.808565] RSP: 002b:00007ffb6e007ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 401.816279] RAX: ffffffffffffffda RBX: 0000000000000036 RCX: 000000000045a4f1 05:38:01 executing program 4: syz_emit_ethernet(0xfffffdef, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 401.823634] RDX: 0000000000000001 RSI: 00007ffb6e007c00 RDI: 00000000000000f0 [ 401.830901] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 401.838165] R10: 0000000000000064 R11: 0000000000000293 R12: 00007ffb6e0086d4 [ 401.845430] R13: 00000000004c9cb0 R14: 00000000004e18e0 R15: 0000000000000003 05:38:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000002545204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:01 executing program 3 (fault-call:0 fault-nth:4): syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 401.967761] net_ratelimit: 14 callbacks suppressed [ 401.967770] protocol 88fb is buggy, dev hsr_slave_0 [ 401.977914] protocol 88fb is buggy, dev hsr_slave_1 05:38:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:38:01 executing program 4: syz_emit_ethernet(0xfffffffffffffdef, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 402.050018] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 402.099636] SELinux: policydb string %E Linux does not match my string SE Linux [ 402.107451] SELinux: failed to load policy 05:38:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r3, r2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r4, 0x0, 0xedc0) ioctl$EVIOCGRAB(r4, 0x40044590, &(0x7f0000000000)=0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r5 = getpgrp(0x0) r6 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) r7 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffdb0}, 0x8, 0x0) rt_tgsigqueueinfo(r5, r6, 0x1d, &(0x7f0000000340)={0x0, 0x0, 0xfffffffd}) read(r7, &(0x7f0000481000)=""/128, 0x374) [ 402.155966] block nbd2: Attempted send on invalid socket [ 402.161631] print_req_error: I/O error, dev nbd2, sector 0 [ 402.178608] F2FS-fs (nbd2): Unable to read 1th superblock 05:38:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 402.216486] block nbd2: Attempted send on invalid socket [ 402.222250] print_req_error: I/O error, dev nbd2, sector 8 [ 402.230251] F2FS-fs (nbd2): Unable to read 2th superblock 05:38:01 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:01 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 402.270138] block nbd2: Attempted send on invalid socket [ 402.275704] print_req_error: I/O error, dev nbd2, sector 0 [ 402.286880] F2FS-fs (nbd2): Unable to read 1th superblock 05:38:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080200005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 402.345202] block nbd2: Attempted send on invalid socket [ 402.350349] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 402.350801] print_req_error: I/O error, dev nbd2, sector 8 [ 402.368300] F2FS-fs (nbd2): Unable to read 2th superblock 05:38:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x2, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0xc5) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x20, &(0x7f00000002c0)='wlan0bdevvboxnet1md5sum:\x00') 05:38:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:38:01 executing program 3: syz_emit_ethernet(0xd, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 402.447716] protocol 88fb is buggy, dev hsr_slave_0 [ 402.452869] protocol 88fb is buggy, dev hsr_slave_1 [ 402.478644] SELinux: policydb string length 520 does not match expected length 8 [ 402.491616] SELinux: failed to load policy 05:38:02 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x2], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 402.611701] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 402.671034] proc: unrecognized mount option "wlan0bdevvboxnet1md5sum:" or missing value [ 402.690117] block nbd2: Attempted send on invalid socket [ 402.695637] print_req_error: I/O error, dev nbd2, sector 0 [ 402.701689] F2FS-fs (nbd2): Unable to read 1th superblock [ 402.715298] block nbd2: Attempted send on invalid socket 05:38:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080300005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:02 executing program 3: syz_emit_ethernet(0x140, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x3, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:02 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x3], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 402.720902] print_req_error: I/O error, dev nbd2, sector 8 [ 402.735115] F2FS-fs (nbd2): Unable to read 2th superblock [ 402.753843] proc: unrecognized mount option "wlan0bdevvboxnet1md5sum:" or missing value [ 402.767730] protocol 88fb is buggy, dev hsr_slave_0 [ 402.772969] protocol 88fb is buggy, dev hsr_slave_1 [ 402.855145] SELinux: policydb string length 776 does not match expected length 8 05:38:02 executing program 3: syz_emit_ethernet(0xfdef, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:02 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x4], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:02 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r2, r1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r3, 0x0, 0xedc0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r4) io_setup(0x1000, &(0x7f0000000140)=0x0) io_submit(r5, 0x200002ba, &(0x7f0000000040)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r4, 0x0}]) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r7, r6, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r9, r8, 0x0) connect$inet6(r8, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r10 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r8, r10, 0x0, 0xedc0) r11 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x10000, 0x1) r12 = socket$inet6(0xa, 0x2, 0x0) r13 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r13, r12, 0x0) connect$inet6(r12, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r14 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r12, r14, 0x0, 0xedc0) io_cancel(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8, 0x1000, r14, &(0x7f0000000180)="b2e436b08970e26da121967b7c20ab54d1fe75b04aa852c5cd09eb23e5ac22138afbdbdb42534c46a94606927a22c59df48ed1b84e81a2dee90c6458d7acec3324c0e89911b586776656c42494061f9a68d6fc31c4b8f7b59dbc32d47e5876e9b48c2b0eb09e893ac4264d6febfb398c7dde6c45be132ac3048c1f43725510c244461c3517bd378f2f5e7e7367ebbc675cda0a51f1d35df2d5ca6ce03967e6cb98bc64ca14b5402c0c3d7ca9136f204c902f", 0xffffffffffffffb7, 0x8, 0x0, 0x2, r11}, &(0x7f0000000280)) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000080)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @exp_fastopen={0xfe, 0x4}, @window={0x4, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0xc, 0xf989, "908fabfe9a69b583"}]}}}}}}}}, 0x0) [ 402.895805] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 402.928436] SELinux: failed to load policy 05:38:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:38:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x4, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 403.087711] protocol 88fb is buggy, dev hsr_slave_0 [ 403.087716] protocol 88fb is buggy, dev hsr_slave_0 [ 403.087763] protocol 88fb is buggy, dev hsr_slave_1 [ 403.092875] protocol 88fb is buggy, dev hsr_slave_1 05:38:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080400005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:02 executing program 3: syz_emit_ethernet(0x200000b6, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 403.153336] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 05:38:02 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x5], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x5, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 403.242565] SELinux: policydb string length 1032 does not match expected length 8 05:38:02 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x80200, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000540)={0x3, 0x5, 0xfff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2000, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f0000000000), &(0x7f0000002600)=0x4) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000180)=@get={0x1, &(0x7f0000000240)=""/162, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) capget(0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r2, r1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r3, 0x0, 0xedc0) ioctl$RTC_PIE_OFF(r3, 0x7006) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20004000) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x28, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, [@FRA_GENERIC_POLICY=@FRA_SUPPRESS_PREFIXLEN={0x8, 0xe, 0x8000}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') ftruncate(0xffffffffffffffff, 0x2007fff) ftruncate(0xffffffffffffffff, 0x2008002) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0xa198) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="010000008142e441ae93ef193f74a6adb8df966d0b59756bb0c27dfbba1ae7f4d964953dbd5a7b89dac1aa6077961ec8ae2762d9a8713b5b4c01a091fdee64d3ce7a35470649252890609feca10b6b37e3282377399982e17847ef237d2aa142b5dd59", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000006540)={r6, @in6={{0xa, 0x4e20, 0x637, @remote}}}, 0x84) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e21, 0xbc, @loopback}, 0x1c) [ 403.309259] SELinux: failed to load policy 05:38:02 executing program 3: syz_emit_ethernet(0x7ffff000, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:38:02 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x6], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 403.445033] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 05:38:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080500005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x6, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:03 executing program 3: syz_emit_ethernet(0xfffffdef, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 403.666901] SELinux: policydb string length 1288 does not match expected length 8 05:38:03 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x7], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:03 executing program 3: syz_emit_ethernet(0xfffffffffffffdef, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 403.715766] SELinux: failed to load policy [ 403.718009] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 05:38:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:38:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0xc502, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000180)=ANY=[@ANYBLOB="00020201005e317ef5d81d7475060000004d31d09fa1000f8c5a0ccaa16b1dc86e6f9c"], 0x18) getsockopt$inet6_opts(r1, 0x29, 0x39, 0x0, &(0x7f0000000040)=0xffffffb6) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 05:38:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x7, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080600005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:03 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x8], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:03 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 404.097170] SELinux: policydb string length 1544 does not match expected length 8 [ 404.106714] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 404.115482] SELinux: failed to load policy 05:38:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) io_setup(0x4, &(0x7f0000000500)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) sysinfo(&(0x7f00000002c0)=""/197) dup3(r1, r2, 0x0) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 05:38:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0xf, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:03 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0xa], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:03 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x2], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080700005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x48, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:03 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0xb], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 404.485025] SELinux: policydb string length 1800 does not match expected length 8 [ 404.499111] SELinux: failed to load policy 05:38:04 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x3], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:38:04 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0xd], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x4c, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9084800005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:04 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x4], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:04 executing program 0: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, r0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xedc0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80400) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r5, r4, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r6, 0x0, 0xedc0) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r8, r7, 0x0) r9 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) dup2(r3, r9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r11 = open$dir(&(0x7f0000000040)='./file0\x00', 0x84800, 0x0) write$9p(r10, &(0x7f0000000800)="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", 0x600) sendfile(r10, r11, 0x0, 0x10000) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 05:38:04 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0xe], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 405.053132] validate_nla: 3 callbacks suppressed [ 405.053143] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 405.076228] SELinux: policydb string length 18440 does not match expected length 8 [ 405.098587] SELinux: failed to load policy 05:38:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x60, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 405.245820] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 05:38:04 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x5], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9084c00005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x68, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:04 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x11], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 405.323157] audit: type=1800 audit(1574141884.793:4519): pid=18323 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16614 res=0 [ 405.426661] audit: type=1804 audit(1574141884.833:4520): pid=18323 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir236754625/syzkaller.omzjAi/223/file0" dev="sda1" ino=16614 res=1 05:38:05 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 405.495494] SELinux: policydb string length 19464 does not match expected length 8 [ 405.503175] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 405.535117] SELinux: failed to load policy 05:38:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x6c, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:05 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x6], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 405.571704] audit: type=1800 audit(1574141884.833:4521): pid=18323 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16614 res=0 05:38:05 executing program 0: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, r0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xedc0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80400) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r5, r4, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r6, 0x0, 0xedc0) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r8, r7, 0x0) r9 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) dup2(r3, r9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r11 = open$dir(&(0x7f0000000040)='./file0\x00', 0x84800, 0x0) write$9p(r10, &(0x7f0000000800)="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", 0x600) sendfile(r10, r11, 0x0, 0x10000) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 05:38:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 405.719462] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 405.746350] audit: type=1800 audit(1574141885.013:4522): pid=18433 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16614 res=0 05:38:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9086000005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:05 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x28], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:05 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x7], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x74, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 405.905580] SELinux: policydb string length 24584 does not match expected length 8 [ 405.953167] SELinux: failed to load policy [ 405.981488] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 05:38:05 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x60], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:05 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x8], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 406.063665] audit: type=1800 audit(1574141885.533:4523): pid=18565 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16595 res=0 05:38:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x7a, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:38:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9086800005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 406.147828] audit: type=1804 audit(1574141885.583:4524): pid=18565 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir236754625/syzkaller.omzjAi/224/file0" dev="sda1" ino=16595 res=1 05:38:05 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 406.319011] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 406.343316] audit: type=1800 audit(1574141885.583:4525): pid=18565 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16595 res=0 [ 406.401491] SELinux: policydb string length 26632 does not match expected length 8 [ 406.454730] SELinux: failed to load policy [ 406.514601] nbd_handle_cmd: 30 callbacks suppressed [ 406.514618] block nbd2: Attempted send on invalid socket [ 406.525738] print_req_error: 30 callbacks suppressed [ 406.525748] print_req_error: I/O error, dev nbd2, sector 0 [ 406.538791] f2fs_msg: 30 callbacks suppressed [ 406.541874] F2FS-fs (nbd2): Unable to read 1th superblock [ 406.600764] block nbd2: Attempted send on invalid socket [ 406.606525] print_req_error: I/O error, dev nbd2, sector 8 [ 406.618533] F2FS-fs (nbd2): Unable to read 2th superblock 05:38:06 executing program 0: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, r0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xedc0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80400) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r5, r4, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r6, 0x0, 0xedc0) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r8, r7, 0x0) r9 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) dup2(r3, r9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r11 = open$dir(&(0x7f0000000040)='./file0\x00', 0x84800, 0x0) write$9p(r10, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) sendfile(r10, r11, 0x0, 0x10000) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 05:38:06 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0xa], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0xf0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:06 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x2], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9086c00005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 406.668432] block nbd2: Attempted send on invalid socket [ 406.673987] print_req_error: I/O error, dev nbd2, sector 0 [ 406.680169] F2FS-fs (nbd2): Unable to read 1th superblock [ 406.687096] block nbd2: Attempted send on invalid socket [ 406.692829] print_req_error: I/O error, dev nbd2, sector 8 [ 406.704337] F2FS-fs (nbd2): Unable to read 2th superblock 05:38:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) [ 406.776705] SELinux: policydb string length 27656 does not match expected length 8 [ 406.797082] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 406.815922] SELinux: failed to load policy 05:38:06 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x3], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x1a0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:06 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0xb], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 406.959113] block nbd2: Attempted send on invalid socket [ 406.964676] print_req_error: I/O error, dev nbd2, sector 0 [ 406.978269] F2FS-fs (nbd2): Unable to read 1th superblock [ 407.009315] block nbd2: Attempted send on invalid socket [ 407.014865] print_req_error: I/O error, dev nbd2, sector 8 [ 407.026233] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 05:38:06 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x4], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9087400005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:06 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0xd], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 407.058669] F2FS-fs (nbd2): Unable to read 2th superblock [ 407.120044] block nbd2: Attempted send on invalid socket [ 407.125608] print_req_error: I/O error, dev nbd2, sector 0 [ 407.140129] F2FS-fs (nbd2): Unable to read 1th superblock [ 407.181126] audit: type=1800 audit(1574141886.653:4526): pid=18828 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16662 res=0 [ 407.208766] block nbd2: Attempted send on invalid socket [ 407.214321] print_req_error: I/O error, dev nbd2, sector 8 [ 407.231375] F2FS-fs (nbd2): Unable to read 2th superblock [ 407.240371] SELinux: policydb string length 29704 does not match expected length 8 [ 407.248018] net_ratelimit: 17 callbacks suppressed [ 407.248028] protocol 88fb is buggy, dev hsr_slave_0 [ 407.248419] protocol 88fb is buggy, dev hsr_slave_0 [ 407.253255] protocol 88fb is buggy, dev hsr_slave_1 [ 407.258291] protocol 88fb is buggy, dev hsr_slave_1 [ 407.275017] audit: type=1804 audit(1574141886.713:4527): pid=18828 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir236754625/syzkaller.omzjAi/225/file0" dev="sda1" ino=16662 res=1 [ 407.332879] SELinux: failed to load policy [ 407.347680] audit: type=1800 audit(1574141886.743:4528): pid=18828 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16662 res=0 05:38:07 executing program 0: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, r0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xedc0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80400) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r5, r4, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r6, 0x0, 0xedc0) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r8, r7, 0x0) r9 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) dup2(r3, r9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r11 = open$dir(&(0x7f0000000040)='./file0\x00', 0x84800, 0x0) write$9p(r10, &(0x7f0000000800)="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", 0x600) sendfile(r10, r11, 0x0, 0x10000) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 05:38:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x300, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:07 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x5], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:07 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0xe], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:38:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9087a00005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:07 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x11], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 407.755582] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 407.756526] block nbd2: Attempted send on invalid socket [ 407.764018] SELinux: policydb string length 31240 does not match expected length 8 [ 407.768763] print_req_error: I/O error, dev nbd2, sector 0 [ 407.784045] F2FS-fs (nbd2): Unable to read 1th superblock [ 407.798203] SELinux: failed to load policy 05:38:07 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x6], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 407.809138] block nbd2: Attempted send on invalid socket [ 407.814642] print_req_error: I/O error, dev nbd2, sector 8 [ 407.827568] F2FS-fs (nbd2): Unable to read 2th superblock 05:38:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x328, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:07 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080003005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:07 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x7], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 408.047391] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 408.161292] SELinux: policydb string length 196616 does not match expected length 8 [ 408.199269] SELinux: failed to load policy [ 408.207859] protocol 88fb is buggy, dev hsr_slave_0 [ 408.213049] protocol 88fb is buggy, dev hsr_slave_1 05:38:08 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x75) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x38}}, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5e, r4}) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x87, 0x0, 0x0, 0x4, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x400}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 05:38:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:38:08 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x8], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x500, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:08 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x28], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080005005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 408.687006] SELinux: policydb string length 327688 does not match expected length 8 [ 408.695179] protocol 88fb is buggy, dev hsr_slave_0 [ 408.695255] protocol 88fb is buggy, dev hsr_slave_1 05:38:08 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0xa], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 408.747995] SELinux: failed to load policy 05:38:08 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x60], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x600, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080006005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x80000000000004) set_tid_address(&(0x7f0000000300)) 05:38:08 executing program 0: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000180)=@generic, 0x80, &(0x7f0000000240)=[{&(0x7f0000000380)=""/184, 0xb8}, {&(0x7f0000000440)=""/218, 0xda}], 0x2, &(0x7f0000000540)=""/213, 0xd5}, 0x80014022) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb888108744339e535a893509d12bb3d06a2e00"/189], 0x5) write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000a40)=ANY=[@ANYBLOB="7e6678686fa8bee97cb72a9121c53bda022f6126868b"], 0x5) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000940)=ANY=[@ANYBLOB="00000000000000000000000000000000a36504a5d200000000000000000000000000000000000000000044ab83f9d60000000000000000000000000000000000000000000000000000000500000000000000fdfffffffffffffffd060000000000000000000900000000000000000000000000000000000000000000000000000000000000200000ed030000000000000000000000ffffff7f00000000010000800000000000000000000000000000000000000000b100d7025bbe622200000000"]) r3 = socket(0xa, 0x3, 0x8) r4 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r6 = gettid() waitid(0x83b895581628fca4, r6, &(0x7f0000000040), 0x2, &(0x7f0000000480)) sendmsg$key(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r5, @ANYRESDEC=r6]], 0xfffffffffffffe56}}, 0x20004850) r7 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r8 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r9 = dup2(r8, r7) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r9, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) r10 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_HW_FREQ_SEEK(r10, 0x40305652, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x3ffffffc}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r10, 0xc08c5334, &(0x7f0000000200)) r11 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r11) timer_create(0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, @tid=r11}, 0x0) kcmp(r11, r11, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r11, 0x0, 0x0) r12 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r11, r12, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r6, r9, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r13}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r13}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r13}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00', r13}, 0x30) ptrace$setregset(0x4205, r14, 0x3, &(0x7f0000000900)={&(0x7f0000000800)="817bd91942e7091d39e893e34ff8613356881f4046ab7643a5ae551a488c09ee462702c4dffc42fb95afa5922573af196ba026712254d95907377dfa484a893ca9e78c3793a67e1dfbda0203fe9379aaf88dd2ec536c5ae8cc011f22be322c2c0a89ed9cbc889639ba25aaf749e1e8981ebce96ea665d64f1574a819802d40d93f4f45bd9260624c5e0356ee01884d271c89e2e9514cf46598c7dd3ab74d65e356f4911458cf05a1cb8a943fc388253162dc5612500b3efdf6be48f6550921365dd4ccc926611f22a23f2d11ec67e818e5f937222692d3af3f6d9b5acde6c1c6d0ec", 0xe2}) umount2(&(0x7f0000000040)='./file0\x00', 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 05:38:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x700, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:08 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0xb], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:08 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 409.007716] protocol 88fb is buggy, dev hsr_slave_0 [ 409.012871] protocol 88fb is buggy, dev hsr_slave_1 [ 409.049904] SELinux: policydb string length 393224 does not match expected length 8 [ 409.090509] SELinux: failed to load policy 05:38:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0xf00, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080007005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:08 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x2], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:08 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0xd], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 409.392478] SELinux: policydb string length 458760 does not match expected length 8 [ 409.408124] bridge0: port 3(gretap0) entered blocking state [ 409.423408] bridge0: port 3(gretap0) entered disabled state 05:38:09 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x3], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:09 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0xe], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 409.532557] device gretap0 entered promiscuous mode [ 409.579402] bridge0: port 3(gretap0) entered blocking state [ 409.585546] bridge0: port 3(gretap0) entered forwarding state 05:38:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x2803, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080020005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:09 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x4], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:09 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x11], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x3f00, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 409.839318] SELinux: policydb string length 2097160 does not match expected length 8 05:38:09 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x5], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) socket$kcm(0x10, 0x2, 0x4) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, r0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xedc0) sendmsg$kcm(r2, &(0x7f00000039c0)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000000)="957147d4d3fe2807cf785a430def1aa3faff4b", 0x13}, {&(0x7f0000000140)="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", 0x1000}, {&(0x7f0000000040)="529853a5ee65923ed7d108d78db195b2a69df55f", 0x14}, {&(0x7f0000000080)="5f53e3457e2aad42aa42321db49f7862f6c852ec15f4a8b4c7ddb321e2c5ad495405ca6b31d48f919c83d07a1469228af3bbfea68f7026f4546b1f1d756e56837904c8dbbfc1d36626eb612a2ec0aafdc2de134e082295d28e4c963f379508aaa5af05392eda77b9dc35201f1ae65ed718c2df435777c06845b810", 0x7b}], 0x4, 0x0, 0xfffffffffffffe90, 0xc00e}, 0x0) 05:38:09 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x4800, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080048005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 410.177256] SELinux: policydb string length 4718600 does not match expected length 8 [ 410.214255] validate_nla: 8 callbacks suppressed [ 410.214267] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 05:38:09 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x28], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r2, r1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r3, 0x0, 0xedc0) ioctl$RTC_ALM_READ(r3, 0x80247008, &(0x7f0000000000)) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 410.215997] sel_write_load: 2 callbacks suppressed [ 410.216003] SELinux: failed to load policy 05:38:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x4c00, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:09 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x6], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(0x0) 05:38:09 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x60], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 410.419750] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 05:38:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x6000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf908004c005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:10 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x7], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:10 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 410.662620] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 05:38:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="140000002f008151e00f8000db4cb90402486516", 0x14}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r2, r1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r3, 0x0, 0xedc0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x4020) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000040)={0x6, 0x7, 0x7fff, 0x5}, 0x8) [ 410.709513] SELinux: policydb string length 4980744 does not match expected length 8 05:38:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x6800, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 410.773107] SELinux: failed to load policy 05:38:10 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x8], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(0x0) 05:38:10 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x2], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 410.873313] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 05:38:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080060005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x6c00, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:10 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x4, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x32) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x0) 05:38:10 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0xa], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:10 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x3], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 411.113743] SELinux: policydb string length 6291464 does not match expected length 8 [ 411.143372] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 411.170014] SELinux: failed to load policy 05:38:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syslog(0x2, &(0x7f0000000000)=""/150, 0x96) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpgid(0x0) 05:38:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x7400, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:10 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0xb], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:10 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x4], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080068005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(0x0) [ 411.394493] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 411.439082] SELinux: policydb string length 6815752 does not match expected length 8 05:38:11 executing program 0: r0 = socket$isdn_base(0x22, 0x3, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x75) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x38}}, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={@mcast2, @empty, @loopback, 0x7000, 0x1, 0x1, 0x400, 0x9, 0x60000, r4}) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000100)) 05:38:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x7a00, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:11 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0xd], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 411.517368] SELinux: failed to load policy 05:38:11 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x5], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 411.584996] nbd_handle_cmd: 26 callbacks suppressed [ 411.585014] block nbd2: Attempted send on invalid socket [ 411.595814] print_req_error: 26 callbacks suppressed [ 411.595824] print_req_error: I/O error, dev nbd2, sector 0 [ 411.607961] f2fs_msg: 26 callbacks suppressed [ 411.608012] F2FS-fs (nbd2): Unable to read 1th superblock [ 411.653584] block nbd2: Attempted send on invalid socket [ 411.659272] print_req_error: I/O error, dev nbd2, sector 8 [ 411.673716] F2FS-fs (nbd2): Unable to read 2th superblock [ 411.713438] block nbd2: Attempted send on invalid socket [ 411.719367] print_req_error: I/O error, dev nbd2, sector 0 [ 411.726517] F2FS-fs (nbd2): Unable to read 1th superblock [ 411.753225] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 05:38:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf908006c005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:11 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x10004000000002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000940)}], 0x2}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @rand_addr, @local}, 0xc) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000680)={{0x0, 0x0, 0xee00, 0x0, 0xee01}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r5, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r5, 0xae9a) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 411.766228] block nbd2: Attempted send on invalid socket [ 411.771890] print_req_error: I/O error, dev nbd2, sector 8 [ 411.783132] F2FS-fs (nbd2): Unable to read 2th superblock 05:38:11 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0xe], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:11 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x6], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0xf000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 411.953752] SELinux: policydb string length 7077896 does not match expected length 8 [ 411.991971] SELinux: failed to load policy 05:38:11 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x11], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 412.008375] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 05:38:11 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x7], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:11 executing program 2 (fault-call:3 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x30000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080074005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:11 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:11 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000003c0)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={0x0, r2}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x3f, r1) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r6, r5, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r5, r7, 0x0, 0xedc0) getsockopt$IP_VS_SO_GET_INFO(r5, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$inet6_tcp_int(r4, 0x6, 0x2000000000000022, &(0x7f0000000140)=0x1, 0x4) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0xd}, 0x1c) sendto$inet6(r4, &(0x7f0000000340)='\t', 0x1, 0x200400cf, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) [ 412.244135] FAULT_INJECTION: forcing a failure. [ 412.244135] name failslab, interval 1, probability 0, space 0, times 0 [ 412.273264] CPU: 0 PID: 20488 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 412.280245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.289684] Call Trace: [ 412.292277] dump_stack+0x197/0x210 [ 412.295903] should_fail.cold+0xa/0x1b [ 412.299785] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 412.304881] ? lock_downgrade+0x880/0x880 [ 412.309032] __should_failslab+0x121/0x190 [ 412.313261] should_failslab+0x9/0x14 [ 412.317051] __kmalloc_track_caller+0x2de/0x750 [ 412.321716] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 412.327343] ? strndup_user+0x77/0xd0 [ 412.331140] memdup_user+0x26/0xb0 [ 412.334694] strndup_user+0x77/0xd0 [ 412.338315] ksys_mount+0x3c/0x150 [ 412.341847] __x64_sys_mount+0xbe/0x150 [ 412.345816] do_syscall_64+0xfd/0x620 [ 412.349613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 412.354798] RIP: 0033:0x45a639 [ 412.357997] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 412.376887] RSP: 002b:00007f973be08c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 412.384596] RAX: ffffffffffffffda RBX: 00007f973be08c90 RCX: 000000000045a639 [ 412.391854] RDX: 0000000020000600 RSI: 00000000200003c0 RDI: 0000000020000380 [ 412.399115] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 412.406375] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f973be096d4 [ 412.413632] R13: 00000000004c71c0 R14: 00000000004dc948 R15: 0000000000000004 [ 412.423924] net_ratelimit: 14 callbacks suppressed [ 412.423982] protocol 88fb is buggy, dev hsr_slave_0 [ 412.434683] protocol 88fb is buggy, dev hsr_slave_1 05:38:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x34000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 412.454816] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 412.466073] SELinux: policydb string length 7602184 does not match expected length 8 [ 412.476662] SELinux: failed to load policy 05:38:12 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x8], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf908007a005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 412.619888] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 05:38:12 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x28], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:12 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x400300, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:12 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0xa], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 412.813432] SELinux: policydb string length 7995400 does not match expected length 8 [ 412.847720] protocol 88fb is buggy, dev hsr_slave_0 [ 412.852878] protocol 88fb is buggy, dev hsr_slave_1 [ 412.905471] SELinux: failed to load policy 05:38:12 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x60], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:12 executing program 2 (fault-call:3 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:12 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0xb], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:12 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0xf0ffff, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005845204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 413.167718] protocol 88fb is buggy, dev hsr_slave_0 [ 413.172900] protocol 88fb is buggy, dev hsr_slave_1 [ 413.249584] SELinux: policydb string XE Linux does not match my string SE Linux [ 413.258954] SELinux: failed to load policy [ 413.305861] FAULT_INJECTION: forcing a failure. [ 413.305861] name failslab, interval 1, probability 0, space 0, times 0 [ 413.318015] CPU: 1 PID: 20753 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 413.324976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.334341] Call Trace: [ 413.336955] dump_stack+0x197/0x210 [ 413.340628] should_fail.cold+0xa/0x1b [ 413.344546] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 413.349676] ? lock_downgrade+0x880/0x880 [ 413.353845] __should_failslab+0x121/0x190 [ 413.358079] should_failslab+0x9/0x14 [ 413.361877] __kmalloc_track_caller+0x2de/0x750 [ 413.366542] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 413.372081] ? strndup_user+0x77/0xd0 [ 413.375872] memdup_user+0x26/0xb0 [ 413.379404] strndup_user+0x77/0xd0 [ 413.383027] ksys_mount+0x7b/0x150 [ 413.386557] __x64_sys_mount+0xbe/0x150 [ 413.390526] do_syscall_64+0xfd/0x620 [ 413.394321] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 413.399504] RIP: 0033:0x45a639 [ 413.402688] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 413.421591] RSP: 002b:00007f973be08c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 413.429308] RAX: ffffffffffffffda RBX: 00007f973be08c90 RCX: 000000000045a639 [ 413.436582] RDX: 0000000020000600 RSI: 00000000200003c0 RDI: 0000000020000380 [ 413.443845] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 413.451109] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f973be096d4 [ 413.458381] R13: 00000000004c71c0 R14: 00000000004dc948 R15: 0000000000000004 [ 413.489100] protocol 88fb is buggy, dev hsr_slave_0 [ 413.495326] protocol 88fb is buggy, dev hsr_slave_1 [ 413.495579] protocol 88fb is buggy, dev hsr_slave_0 [ 413.505473] protocol 88fb is buggy, dev hsr_slave_1 05:38:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x1000000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:13 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:13 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0xd], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:13 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) 05:38:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080002005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x2000000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:13 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0xe], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:13 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x2], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 413.715641] SELinux: policydb string length 131080 does not match expected length 8 [ 413.746589] SELinux: failed to load policy 05:38:13 executing program 2 (fault-call:3 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x3000000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:13 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x3], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080003005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:13 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x11], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x4000000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 413.981929] FAULT_INJECTION: forcing a failure. [ 413.981929] name failslab, interval 1, probability 0, space 0, times 0 [ 414.047482] CPU: 1 PID: 20993 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 414.054511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.063880] Call Trace: [ 414.066505] dump_stack+0x197/0x210 [ 414.070171] should_fail.cold+0xa/0x1b [ 414.074090] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 414.079221] ? lock_downgrade+0x880/0x880 [ 414.083413] __should_failslab+0x121/0x190 [ 414.087669] should_failslab+0x9/0x14 [ 414.091487] kmem_cache_alloc+0x2ae/0x700 05:38:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x5000000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 414.095758] ? __might_fault+0x12b/0x1e0 [ 414.099923] getname_flags+0xd6/0x5b0 [ 414.103776] user_path_at_empty+0x2f/0x50 [ 414.108299] do_mount+0x150/0x2bc0 [ 414.111862] ? copy_mount_string+0x40/0x40 [ 414.116114] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 414.121661] ? _copy_from_user+0xdd/0x150 [ 414.125827] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 414.131378] ? copy_mount_options+0x280/0x3a0 [ 414.135901] ksys_mount+0xdb/0x150 [ 414.139461] __x64_sys_mount+0xbe/0x150 [ 414.143457] do_syscall_64+0xfd/0x620 [ 414.147281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 414.152485] RIP: 0033:0x45a639 [ 414.155690] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 414.174600] RSP: 002b:00007f973be08c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 414.182323] RAX: ffffffffffffffda RBX: 00007f973be08c90 RCX: 000000000045a639 [ 414.189604] RDX: 0000000020000600 RSI: 00000000200003c0 RDI: 0000000020000380 [ 414.196884] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 414.204167] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f973be096d4 [ 414.211563] R13: 00000000004c71c0 R14: 00000000004dc948 R15: 0000000000000004 [ 414.234047] SELinux: policydb string length 196616 does not match expected length 8 [ 414.252747] SELinux: failed to load policy 05:38:14 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x4], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:14 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x6000000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080004005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:14 executing program 2 (fault-call:3 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:14 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) fchdir(r0) socket$inet6(0xa, 0x400000000001, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f00000000c0)=""/50) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_ENUMOUTPUT(r2, 0xc0485630, &(0x7f0000000100)={0x200, "ec6ad87a1d2bf0805b95e4ac012b727c8280b2ae8a3965a1f1fb1dd48cf6f0d9"}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket(0x8, 0x0, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r5) socket(0x0, 0x2, 0x0) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/checkreqprot\x00', 0x20000, 0x0) accept4$tipc(r6, 0x0, &(0x7f0000000440), 0x800) r7 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$sock_cred(r7, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r10, r9, 0x0) connect$inet6(r9, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r11 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r9, r11, 0x0, 0xedc0) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x75) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r14}]]}}}]}, 0x38}}, 0x0) sendmmsg(r6, &(0x7f00000053c0)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000580)="33b3336f4fa5bf3d58b04a9051a558de9f299f3bb6a1f4c40a5888998f6c8d4efda0cd65f3a5ead3808043f8a19fdd43d962533695d37cc50a117480af08d6a4840a88e2b8d8af5cb5eefae19aeffc488d502c238b636413115b3d5a4c1b6f4fa1a5ca833213956993a528c0c0a507527bd5b6999577931a466eed4f9d6dc98e835909ed716e735de5d5bf539cc8f37b3c24d67a058e32653e42ab91b9ff2ddc", 0xa0}, {&(0x7f0000000640)="5b899fa3ad3014371c36fda4180a74540b30ca397fac5cf5efafb83160adaf241abe4505760325af381647a9d211e2c6e2ad5076c27a9db8efc2040201f393822f133f3e2a9c6900", 0x48}, {&(0x7f00000006c0)="9ed914eccfb79ee06deab6c2a84eb069835ce64ae9cb62c867f7ade6170dad5bc32e524e343b5c2cc23de68a3844add1e4807e8515249c6d7981813ea3962481b3bedf832cd122a2ca082b88ed03eb01624cb32a9b5e50829c3f65c0f0be53c94f49da92afdf21842d307aa5", 0x6c}, {&(0x7f0000000080)="ce7b54b8ff98e33497fb0fe20b2afb1138f26a", 0x13}], 0x4, &(0x7f0000002bc0)=ANY=[@ANYBLOB="80000068fbffffffffffffff030000004b32a9ed65162404cbf373198eae2214d763065cc9aaac53f3eb4830b6c444a48f495404b090a3e88f35d62cf06103776d20bb42983167e228fc08ba84f5153e697e1292dfadaf02116eda97ee59c4995b4adf404438104440d8f265c8e67b346f5129a1a8d55ff240ceadaead62b0ab97de8c4cf5babae31144c7e0c6cad8a1eed506aabc76a8fb5de7cf2088ef337d2479c87e7acd8f9c3d5cb66996ce718ebbee99233baa9519a7070000000000000000414fa74b530dd3474ed32bf735ad666393b636ae27f0e0309bfa47624e4bd149d9"], 0x80}}, {{&(0x7f00000007c0)=@nl=@kern={0x10, 0x0, 0x0, 0x1}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000840)="fdd3eaf3613ebd52290f623ca706d19bec10cf0b4ef734953ee82b53b81682a92dbfd794efdba29bbf87fa4a5422d87de2a365f23cf4bc75d0ff965573eb8534274bb0db9a641ab801dcbe8bfc200b057790eefbeeb00eb1612da72b8ee1fbbe312bed316a83fc0d02ff84e0c285e1c4357aea6cad1a7e573b4e84295c06686b", 0x80}], 0x1, &(0x7f0000000900)=[{0xb0, 0x3a, 0x8c7b, "0d5a4e8f0b0c409cacf7808eb5bdc8739a51075a494e2d71012cb30d4592e271d0c62838ee53a490ac1fa6ab42c21f8249232ad497bb08ecb026274840542bd12f7f9f40d4994ff5df56d45f7e7f328f765f2e566ad43e5cc3971506bb35b2946a76a2289ed58211e31b7f5af9fd8ea2fec70ee927a3d7a888df7828db3b049d34d18e0b6bb3125d5ada9bbc5362c68a9cc8006bfca759affd2e31cabc3b"}, {0x1010, 0x117, 0x12, "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"}], 0x10c0}}, {{0x0, 0x0, &(0x7f0000002b40)=[{&(0x7f00000019c0)="9a71a5a9c57ea71936c519803cb362543e208ea8695b8ea64879", 0x1a}, {&(0x7f0000001a00)="e6fafd4453a0e26a22b2f97ce608685f35167d8107fd544b80e2198a9af4f6e5c4d6bffec4874afd908450ddc4e6b3fb07478151064619c47ad02847386c806248839789933d21a22e654ac3f4130c4212c552907d582ec5035d047e2200168733f4db3c28cac2f1679cd5f445aeedd53280be20cf1ff0a709f2511dfc69f27536", 0x81}, {&(0x7f0000001ac0)="2ba523e0c2778d2ffb43f21559bc11876bd3e85bed74f3097d42a6518641e1291ea4275ba0c9207234aa608683971c1654c4221a29d103062cafeb4b5b8811e2f02418fce502ae008f57be1325a839124b46c92c1014bfac7a1c98edb9b829117df3f9f3b9eb2987f0a6e4b220af1288ad6278240bec88f7606fc2bb748c16d8dc89e6595d04a7ea94273b7a7e8822b15c7511cd749579d55dc93901ba6d0f1f6285f66d8b11155100d00245fd32d9f5b7b214c2d3430341c9c6bda1b5cec8bb6559c1f20543ef1699aca1905441ab51e5d6fd032437389da58ed78b5fe6e7e37214c4a872bb9e11f72ba13c21c2493a41e6299176927b84eac8d85baad5f3366b9958948c1b6408877ba6104872f8dd653ce7236239e2352e4028e7737104314c1409cecd178a7031d9e7d7aaeb0504bdda97ea725350b4c404236b0d73e90fdbe2ce043d5c2e0802bdd3e004ac30993a11e2e3d391152fd046c8574c364bdee25253fb8a9d9f66984b6dba6938d8f0c2362f37aa523a2770b10886ce2fa84b24f97bf51a4dc445cbbdec55133b7ecb3ab528e9f79b26fcd3b1c7b7e890996e482ba68836fb3b6ff8cecf54839926d11356ced1191023089fd4c80cd517cc4b9b6177926aed79c95b4a037004090de8490dc21d80ab8c688e662d888a5286fff1c84120b51eb41ea50ded0ca2dd68efe1c75f448a8c463905ed116613e1c00ec18ce3b915c66f3f6b9dc4e0a32c27f97c845dd265b5629c7407deef94e0fb8c1b87df1588adfdd6483b833bacc60282897ad90d2cd295ac7047611acc86272dcf7fcbff8748479663b1da56ebcb94b82ecc89d7f78f7a2a72f43309e17ac45c3f5ef2a55b61c11173c25b22145dbdb6b1caae41707da71ca83e9df4fc4b62f694ea92d001cbc46ed2d1378b1dea45fc104614a5c61d53f0f5b70848dd241d6ff053b10deca69cb55391c4ec6021a3e5b41158b79cf6a8b58b91bb890cacaaa3c50d4987bc429813ae8487e9bbe8a07aae1485827ef2e4d9381d0677fc1ae2e972306720212896208fc9e1ab11ad03e3740395b6b62ef311e8df0fa87ab1fdcb75d735ea56a0dd460908320f98ecd777c0d54eb7fc19073906283f79af6be78c533e77621654cbfc49169732303f31e162198a034dc14ba3651fc7e22294a975964e224cc8cae38dd8128482dc16c06813f810419102cc325f3c0d852cde020051876116f25b9701a618057b7bd9582a98268154de3d96f0529baacf94188f09cbbb997b59fbedd8f5901648df014f1fd02cd4042452808973f63c45ff06f921dfde4b5202f52656adc9970df40dbd5880d337859f02d66cfb1be91122abff8538080ce2553b5c4000f84b24c2e59c6ddaf544f4d9f76a08c5b70a56196433c4732909a0d04237b097257219b27be51d9f9a195fbc472469d25781c93bab1b4b0e1b8ccbb1f19decdfb8339241a083102143a84efb7aa87d1bd2140827653772d93868b8a476e2628409994383bc54319a165cf80ea3bd5963769e2284b73e22a9a43a3f2101dff0b1532c69bf8a848a3cf693add80e04e87aea7897649d2482f5f6b22607014237cf231cb0b153d87f85af5ac6cb55f80c098507995c776674b1783c0901dc14de2bd5d75795969a1984a4c9c54deea75e2056aae2ce072e1e9e9c2b5b4c6be8e33b4d4c281194bf28ed69b542e17c20984ae1d27988b96afdb6727892e66013492f573dfd6fe062b14fe64a7c5ffc58057f9eec477024db30576dc546bf9e653cd9fd4327415e60430b88cfd0be24332d67a06d503dd0ead67051a8060558fd77fb9743e2eade91d05d66d228c25aa6297d9b41403fec44481e6bca6491938e5701a2bcd0f0c8dfe5865fbae7ab89501b7f8a81965e65a6c76102377d21a5c34d234421b0d0889ab3263e5af06e1513c7d0c0fba61bbc56f96172e1e94db6550df1adfa10843b15e55743adaf3f0f3b48600f9ccb1c99e02cbdfc12711b96524122a1b738d88d59c98d3c7b89cb4c7f79fef2b7f9ec3e0b3067a7f19190317c8070a4d987f88f6f4117afddbd5d199d471f48d27807139410af4f7fa89d797ec7b14f5c4e52e1e4022337c757cf7d5065e5d927d115ffea2d6de962a3784cd54d9596e6cc48bf43ac5c2b71ea983f28d9321642432e3b7f3f2256dad1c5e57ae1f6ffae615efb286ba9a7d64708dcc5f993e4a9668eea64cad96a4928641e9ba721c9c00326db5a1e3e635fa45cfb9c530f0cf9d534238c530f90008b2ae339e740f2a43411448246617b61f3c5460e96a4a40e5d5becd4a9ceb20a0ce10c02f28004533d469ecd773c0ac0dc64f53471e005b52176bcadee1dc0fc51252272bf52f9531f8871ca7a4319f52114d8f0b5b8c1c33cf017b0026dc77c9d8baa3d30cc2a5c778470c94827fb54caa0941af66be83c3d251d116538c9d6e5be9f516d6b3cf984cbe0921ac00a164bfe9685874cb9e8b9c6b955957b5f41c933e45b7c3bbc31bc68af196fd236aeb0921fabf5a44079b5d377dee1488887be55812363267f3f54d7ed636da8d898bb4de67ec5c2c978361bc8f8dedd213abda81c25f451d1e11847f09cb4b023e7a824bd241a450e103027010cb28b04a91f43c138765052333a33956798dcde60beb05d10a087ad43e204fb1af2970a81674cc2bd0a2de887f83cecbc3110a1dacc6688357f8ec14592298ae7ebe3076f5170f24d36149cd6a5e956a1344ed7a7a7da753df24ad48fb1852f382c7c7a9716c6d82513f9d97193c48acbd641c7b8eab29e720ef1c8d17733da692bba08e4a181f6a20ba365f9c1793a0269a9e67816f5f9e8b17d0808161dac0c5016d27b31e250d7a82803f2c1471f82e3d2f6e90c16b25e5a6ff2b51dfb74e08116c4c83fe10ea01b9a7ec8714543b9f5912645e4d8f3c942acf9f746676cfe13bc28803635cbad30141f18cb18ffcb1c16a5780a3af8820ace78a2f618321e0a9d13c75ff5f90bb9b12cda59f06aad69ddfdee425f6b9b6a8d93966275b3d58aeeb6af26a42a3f079f350fa1de2c66c39a6d528a4311bb51eed64f15e3a1b6969b59c93feb012f57494ec46b6e84a9254e43accb4d0d455c420d720bc976a9b1c54e63d28a145c7de5ef08a0f507759aa7de6e5c5dd56ec9b80737cd7f993399884cd399f6b591f213450517150152a6357be54997b56782115987707d27291f2aa5389e3867b93baad0279187e7264f6a0cf38f09d2058f6aec40e2d9f722f0ab4e9475b754e32a84cb6a3a8dc4bc077c6b8e69d4fc050c04d7bbed8f57a8f2bf680b03842a61347ea57dc326fa86be1dd2737eccbb53f9e9fdd8de846e95467c576fabee9675bdc7ff340ba631a1f1404cc3597fa0efaffa2ae2add1ce4cf6f165bc43c382cec1eacce76d50d8217e628772fd0c22f001d0176c2a69d60b44e4d42afaa768060c22cfef9606805567ba8202eefd0f1c75655a7fec6d7a363529f862ef8d858496af7547a6a0300e858f250d132f9bb4e42a28d10c9c0ffa0ca42945bb1f1adf9bb13f0074ba3cca433b63193a212c351fb459d72fa2fcec35ada4cd563be5eb7b1fe7fe70c61f5c77f7d14d1313765a04103a81acc0bf13a3ca0123b9672ee5ff69dc7f056da4ce63b7633847132962d5f355439d14f7f07710600c10607607a971fd98352891c051d8387e00fd6ddbde3c86bc9a6f334a9d91990355cea4637bfcdcbf1ffd0751673d6664855e4cf0e4b07d1d2f7f87b2b7b5098ba5681fbc8a2dc39c27f08ac3dd1c364a95378cc47abae2124fda4fecdea7e2bda7c9b9520420e8e2842935f322ea5dde64f22973d484c5c607c8248af27a81e2f7e808c9cda23fb36f561be41432173ac15b28f0112a45d8bc5976bbfd3c3f4bb13e6ea253193ac9af3902d3947af6b388ccdb6ccd710055e41570d2669d05a3043b51837e6e79c546b34b223b7859701a6381412d8992f3c7e770d021c55aa3d82770f33ff318da77b43659bb81395e808ed5f89e07a1a9ff9ea13e57af8bfd2ffca41c761af86d589f669d25f3f6a9a4c5c7f91802f96d155c51b1eaf710d6b768b6a986ae641743829682b4aa84280d28d434ce673dbe98171ff7fcb5d1db1bd9427775b01ab7aaf43c8f2e2244735fa26d2cc061e9b02b7e987d8245283acebf99c1432038a63949600e09b01b618a621cb23c02f9c667f2be7c6f7a5908cdfb68e73ad4b9d06d396a16cb3e3edb6198d8b8c4f884ec853da311d579ef5bfe4329e9dadd11b328957bf41d84af3d58d32e70736b866433864547b769a5f05bf0d2e88e9d61975b646bd88ce99ff3a01458c7e8d8ed6532c1ea814b33da49fda0e718f0a3d03894f8f5f66047d26ed373db551e67c5257687ae43fee4c6f47e9b6d71a9de0816633c69e57abbc9c61e5b31c4d1cff22810558b9b4acac04ce589b1431900006a3434b8c8a8bc4424ea2dc2bbb9c03011d802963a4db6cd3e903b0ed39daae7422c3de683ae5fee18ee453c176acaf3b8cba1e4b39f8f2f54d3d6a9179ebef91ed8bd3fe955bbc428383c9b77fdcadcd3166c93fe9fa3b4712f2ec698af18c119c46e4426b9d6dede6719eb4d98b8f1e94ff4eb22cbd4cae443815462e58794acdd1001802e0cc384938a08a4a4bcf0608d7881599cff425706112633915b4e0b8e6879673115480ae38564a76d5364686080ef5d530ecb96dca8de2669288c5dbc4ea5feb4636d9ca42590f942367c8d920ab3f2329f9284ad42162f6f5831745f795a42bdf4974ec059073be3aa33ec2bd40fcf827f5ecd0270deaf324b9438dc5c77c614a43adbaf66cbdecdabf4c851a405d98e03601d4b5b2102aed29ba8c50e5c51bb86154ecd6634acdb3f54e7e0cd7b3e333a5c1d159362b23163384c57313e0aa69539d41a9ad0c219972c0f7b2a6e2ae166917b91efe5212661e22055acef48a824cbc199046295ffecd75a31e46540db8bb1fab8a99060fdb26f9cde8c841a4510472a86b1ad15c4cf38bf2b758d84c6564692432c4c4cc5dd632aa9ee868b0ab761ccb923c363358a22b5fe4de4e9e28b1d15054c6c9f7b2624d2a1ca96ba9c92e92c2fb460a21eee14119a5f5f7b78a3be6cdfce0f6bd753e9a5230dffd077e2dceb58dbb2899af5bd64fba5c012ac62e5f33f934196d844428f5197ad9cb82173ffe25a38c78820b0c7f9c6ddc3faeeee387b977fbb829de488c0479a65206072349127b0406974f7112f73525a36817a93e93ad8dd8be355b82349b2f6f9fc007b7946573482238b48a1e3cd89d567e21e5ecbdeeac31a01604433f316e6258a7ca954aa9fe25772ba23ece63cff75625cfda7d8003fe72f0497176714a0caa4a040f4c0fb2bf16a3b3dc33f23a975641a0030c84bd3bded117c6a5fe23f8b7f7fcedea44916a2b079963ded252ebe2891fb80bc737bf7a4e72342739ec0c06a852ff09904576d1074c68dec618f67772dad8416462ab29af2219ce08d873b2851f7e873b428c8b4771da4679bd0b939e3fc7e0f43e5e8004bcd750df227f46cc978a43baeea3dada20f40f401aa84b84fa8c080a1ef147d6d159fc49126688a935d0c91c1f1fe2b77937439cd04b3e51f76a7571f999be8578b8ab60f4fced03bedf176bb88bfd0818d3319357557ca02ec58f6897f175c67a419aae12e0f42928529aaab96b7e25305490d81194743d6d7ca5759717d0038c97f3ea2c214c42fc33154b33f94ce0fd113559a4efde8b933a3a7f25f643dc26d7ccde6b9e3497eb5d1f3e2e300cd693bea944149", 0x1000}, {&(0x7f0000002ac0)="6eb400cbaaf8c2062585869549fa80c1", 0x10}, {&(0x7f0000002b00)="bc5f5351d5cb88834f2971bb222ec05197b7c709ee", 0x15}], 0x5, &(0x7f0000005500)=ANY=[@ANYBLOB="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"], 0xe8}}, {{&(0x7f0000002cc0)=@pppol2tpv3={0x18, 0x1, {0x0, r9, {0x2, 0x4e21, @empty}, 0x3, 0x4, 0x1, 0x3}}, 0x80, &(0x7f0000002d40), 0x0, &(0x7f0000002d80)=[{0x1010, 0x8a, 0x7ff, "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"}], 0x1010}}, {{&(0x7f0000003dc0)=@xdp={0x2c, 0xd, r14, 0x40}, 0x80, &(0x7f0000005300)=[{&(0x7f0000003e40)="e26d8c64da0820600dfa28583a590bf15fef22ed5299280c4c40bceb1bd2d609b91aea7cb951260f866a75256e1670d1bb1d7e87fde95821c58213b248110cf54e0a26f42eb8cf4f970d31c09e8bbe63a388ea0aad3d5f1af77e0573714826c0f0a29240254ea5136ca98ebcf724457bac4ad9fd9f8a049e13475c630585a2", 0x7f}, {&(0x7f0000003ec0)="e6c640f2c2b15bded992ca5159e248053c2a9c01e7721770d27f2b34236939379efc03735c6b46b456c79e43bd6abf", 0x2f}, {&(0x7f0000003f00)="03d06c1e2f9c322a56c19dafa5938f878796b92ac3684fe0d8f71a85c0e40d7afd257ede876c0b41ec7f9a59c79671497a2177dadafcca2a78d73a8877e251abf6d750378f23bb2248fac4a3986d303378a929911f5013019de2af88c364cc567969cbf17c0abdb079471160659b9b2d6c730e4f7d8870eec2b12f64bf7313654045aae565896539490feaf34fe66a1f07c0ad9b3fa43d4c703e58dd331b53a07bc545673bf28dac9f33a324f309702b1a7a5228baa3cfafa9dd851a995ce1fe4bd9d22a88a404c5ab4fcd79db5b6c034175bd2169a6af952bbed7b0f2", 0xdd}, {&(0x7f0000004000)="8d4cab5ed1450aa05edd8f1a86d66642870933642d68de797b9142e4", 0x1c}, {&(0x7f0000004040)="ec3d7f82890d5a72d84cb66e0fe9a9b9c1b0e90335f80310a8e09c8c8cd581dcba07d89cb8d7211e2fc51794a465e60f9b149526431df7beaea39a241d558a8bc26b846fdd1ba69522a7edf8a01ed56165c3872042d31f13cb9f0624cc13b547b0a5f23e355f7bcd2231f3e8e2f62e4c2cf83b5d1788c582cfdc3db848b88ac5039d530fce74e7431ec2012039a976c7c3e8f67d134259365f8554f843e6c9a5b1aa3bf43a48c55e53b889be3a4ac0802da99b265362644bc706ab24031316f6c3c543869e69768eea8180e73f3484d99b5071e95994fdca73", 0xd9}, {&(0x7f0000004140)="88965ae369ec999783a47d58f7a738b425bb18f765d45d9c426b0305a82b1c41", 0x20}, {&(0x7f0000004180)="e01480e6242be332dc4fc2a15132866b81ff3be293ef339c176afc92311a5ac3a7594cb488167c5466162e821a2ebcbc471cacca8af796b0b4e9801ff9dda9a110ac9dfb083eb4f077eae3c7035d54f3868f36c8efb691716d34656558b88f71b364362fa54fdf054a6a8c3db5ca5fa2", 0x70}, {&(0x7f0000004200)}, {&(0x7f0000004240)="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", 0x1000}, {&(0x7f0000005240)="62cc454bb96cb8f624706c1b411b0d34e696fddf6a2c8a96ca6f289714ffa2873567fe77426d7a0e7920b2f9ac666f4ed4b0bcaf2f7c241f495a0ba1b2feeaf14d64d3e2cf30404b1b54f2fc4d2f5f35cdd41cbab72e79c4b01fda73c5792ff904d28a371f74ae686139551c44387fb3cb04628149053761de3b30523f19db66ff8cc4fd859c1a4266b04bc53efb272bddf48e87d98e2bdbd66493837e8bc59b", 0xa0}], 0xa}}], 0x5, 0x20094) keyctl$chown(0x4, r8, 0x0, 0x0) fchown(r2, 0xee00, r3) lsetxattr$security_smack_transmute(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='secqrity.SM\xc0\x86\x7f\x1f4TRA\x00', &(0x7f00000003c0)='TRUE', 0x4, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="a7724bdef64346bc54b7b0f781d1d3abf9d1a51c4b0400e77560040088638352550828dd2bcbff2f099fef0000000000000200000040847bc2fd"], 0x2b) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 414.597025] SELinux: policydb string length 262152 does not match expected length 8 [ 414.610928] FAULT_INJECTION: forcing a failure. [ 414.610928] name failslab, interval 1, probability 0, space 0, times 0 05:38:14 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x28], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 414.691441] CPU: 1 PID: 21127 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 414.698440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.707841] Call Trace: [ 414.710567] dump_stack+0x197/0x210 [ 414.714230] should_fail.cold+0xa/0x1b [ 414.718144] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 414.723277] ? lock_downgrade+0x880/0x880 [ 414.727470] __should_failslab+0x121/0x190 [ 414.731726] should_failslab+0x9/0x14 [ 414.735543] kmem_cache_alloc+0x2ae/0x700 05:38:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080005005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 414.739834] ? lock_downgrade+0x880/0x880 [ 414.744180] alloc_vfsmnt+0x28/0x780 [ 414.748010] vfs_kern_mount.part.0+0x2a/0x410 [ 414.752531] do_mount+0x53e/0x2bc0 [ 414.756090] ? copy_mount_string+0x40/0x40 [ 414.760346] ? _copy_from_user+0xdd/0x150 [ 414.764510] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 414.770085] ? copy_mount_options+0x280/0x3a0 [ 414.774605] ksys_mount+0xdb/0x150 [ 414.778169] __x64_sys_mount+0xbe/0x150 [ 414.782172] do_syscall_64+0xfd/0x620 [ 414.785998] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 414.791199] RIP: 0033:0x45a639 [ 414.794395] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 414.813332] RSP: 002b:00007f973be08c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 414.821088] RAX: ffffffffffffffda RBX: 00007f973be08c90 RCX: 000000000045a639 [ 414.828520] RDX: 0000000020000600 RSI: 00000000200003c0 RDI: 0000000020000380 05:38:14 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x60], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x7000000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 414.835800] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 414.843087] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f973be096d4 [ 414.850366] R13: 00000000004c71c0 R14: 00000000004dc948 R15: 0000000000000004 [ 414.891250] SELinux: policydb string length 327688 does not match expected length 8 05:38:14 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x5], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0xf000000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080006005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:14 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:14 executing program 2 (fault-call:3 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) [ 415.362789] SELinux: policydb string length 393224 does not match expected length 8 [ 415.421965] sel_write_load: 2 callbacks suppressed [ 415.421970] SELinux: failed to load policy 05:38:14 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x2], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 415.472830] validate_nla: 9 callbacks suppressed [ 415.472839] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 415.495057] FAULT_INJECTION: forcing a failure. [ 415.495057] name failslab, interval 1, probability 0, space 0, times 0 [ 415.510026] kauditd_printk_skb: 3 callbacks suppressed [ 415.510042] audit: type=1804 audit(1574141894.983:4532): pid=21321 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir236754625/syzkaller.omzjAi/239/bus" dev="sda1" ino=16577 res=1 [ 415.510747] CPU: 1 PID: 21370 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 415.542154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.542161] Call Trace: [ 415.542186] dump_stack+0x197/0x210 [ 415.542210] should_fail.cold+0xa/0x1b [ 415.542229] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 415.542246] ? lock_downgrade+0x880/0x880 [ 415.542277] __should_failslab+0x121/0x190 [ 415.582009] should_failslab+0x9/0x14 [ 415.585801] kmem_cache_alloc+0x2ae/0x700 [ 415.589946] ? lock_downgrade+0x880/0x880 [ 415.594092] alloc_vfsmnt+0x28/0x780 [ 415.597822] vfs_kern_mount.part.0+0x2a/0x410 [ 415.602314] do_mount+0x53e/0x2bc0 [ 415.605848] ? copy_mount_string+0x40/0x40 [ 415.610089] ? _copy_from_user+0xdd/0x150 [ 415.614231] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 415.619760] ? copy_mount_options+0x280/0x3a0 [ 415.624248] ksys_mount+0xdb/0x150 [ 415.627781] __x64_sys_mount+0xbe/0x150 [ 415.631751] do_syscall_64+0xfd/0x620 [ 415.635546] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 415.640726] RIP: 0033:0x45a639 [ 415.643912] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 415.662802] RSP: 002b:00007f973be08c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 415.670501] RAX: ffffffffffffffda RBX: 00007f973be08c90 RCX: 000000000045a639 [ 415.677758] RDX: 0000000020000600 RSI: 00000000200003c0 RDI: 0000000020000380 [ 415.685028] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 415.692299] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f973be096d4 [ 415.699565] R13: 00000000004c71c0 R14: 00000000004dc948 R15: 0000000000000004 05:38:15 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x6], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 415.715621] audit: type=1804 audit(1574141895.183:4533): pid=21321 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir236754625/syzkaller.omzjAi/239/bus" dev="sda1" ino=16577 res=1 05:38:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x20000000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080007005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:15 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x7], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:15 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x3], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 416.024918] SELinux: policydb string length 458760 does not match expected length 8 [ 416.034379] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 416.078060] SELinux: failed to load policy 05:38:15 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x4], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x28030000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:15 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x8], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:15 executing program 2 (fault-call:3 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:15 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x80, 0x0) unshare(0x2040400) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) getpgrp(r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000002c0)='\x00', 0xffffffffffffffff}, 0x30) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x200, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800}, 0x0, 0x1, 0x3}, r1, 0x800000000000010, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_LOCK(r4, 0xb) r5 = shmget$private(0x0, 0x3000, 0x0, &(0x7f000000a000/0x3000)=nil) shmctl$SHM_LOCK(r5, 0xb) shmctl$SHM_INFO(r5, 0xe, &(0x7f0000000780)=""/180) shmat(r5, &(0x7f0000ffc000/0x4000)=nil, 0x5000) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0x364512a2) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000700)='/dev/cachefiles\x00', 0x4c2140, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r6, 0x65, 0x2, &(0x7f0000000740)=0x3ff, 0x4) socket$unix(0x1, 0x37815976521948c0, 0x0) fcntl$getown(r2, 0x9) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0xfffffffffffffd9a) r7 = syz_open_dev$dmmidi(0x0, 0x800, 0x193000) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x8c000) ioctl$KVM_ASSIGN_DEV_IRQ(r8, 0x4040ae70, &(0x7f0000000340)={0x5, 0x62ba631e, 0x6, 0x283}) r9 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x8100, 0x0) ioctl$TIOCLINUX2(r9, 0x541c, &(0x7f0000000280)={0x2, 0x7, 0x8001, 0x0, 0x5, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r7, 0x40bc5311, 0x0) r10 = syz_open_dev$mouse(&(0x7f0000000780)='/dev/input/mouse#\x00', 0x5, 0x113800) r11 = socket$vsock_dgram(0x28, 0x2, 0x0) vmsplice(r11, 0x0, 0x0, 0x19) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r10, 0x40045532, &(0x7f0000000300)=0xffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x11, 0x1}, 0x10) r12 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x80) ioctl$sock_rose_SIOCDELRT(r12, 0x890c, &(0x7f0000000140)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x9, @default, @rose={'rose', 0x0}, 0x6, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) setsockopt$RXRPC_SECURITY_KEY(0xffffffffffffffff, 0x110, 0x1, 0x0, 0x0) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 05:38:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080048005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 416.264549] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 05:38:15 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x5], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x3f000000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 416.334930] FAULT_INJECTION: forcing a failure. [ 416.334930] name failslab, interval 1, probability 0, space 0, times 0 05:38:15 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0xa], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 416.390722] bond0: Releasing backup interface bond_slave_1 [ 416.406751] CPU: 1 PID: 21616 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 416.413748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.423135] Call Trace: [ 416.423170] dump_stack+0x197/0x210 [ 416.423196] should_fail.cold+0xa/0x1b [ 416.423223] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 416.423245] ? lock_downgrade+0x880/0x880 [ 416.423271] __should_failslab+0x121/0x190 [ 416.446855] should_failslab+0x9/0x14 [ 416.450677] __kmalloc_track_caller+0x2de/0x750 [ 416.455363] ? kstrdup_const+0x66/0x80 [ 416.459267] kstrdup+0x3a/0x70 [ 416.462477] kstrdup_const+0x66/0x80 [ 416.466268] alloc_vfsmnt+0xba/0x780 [ 416.470009] vfs_kern_mount.part.0+0x2a/0x410 [ 416.474533] do_mount+0x53e/0x2bc0 [ 416.478968] ? copy_mount_string+0x40/0x40 [ 416.483233] ? _copy_from_user+0xdd/0x150 [ 416.487404] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 416.492964] ? copy_mount_options+0x280/0x3a0 [ 416.497484] ksys_mount+0xdb/0x150 [ 416.501044] __x64_sys_mount+0xbe/0x150 [ 416.505052] do_syscall_64+0xfd/0x620 [ 416.508878] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 416.514080] RIP: 0033:0x45a639 [ 416.517286] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:38:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf908004c005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 416.536210] RSP: 002b:00007f973be08c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 416.543949] RAX: ffffffffffffffda RBX: 00007f973be08c90 RCX: 000000000045a639 [ 416.551240] RDX: 0000000020000600 RSI: 00000000200003c0 RDI: 0000000020000380 [ 416.558530] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 416.560509] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 416.565808] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f973be096d4 [ 416.565819] R13: 00000000004c71c0 R14: 00000000004dc948 R15: 0000000000000004 05:38:16 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x6], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:16 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0xb], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x48000000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:16 executing program 2 (fault-call:3 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:16 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x7], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 416.872109] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 05:38:16 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0xd], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 417.009821] FAULT_INJECTION: forcing a failure. [ 417.009821] name failslab, interval 1, probability 0, space 0, times 0 [ 417.064355] CPU: 1 PID: 21852 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 417.071345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.080714] Call Trace: [ 417.083323] dump_stack+0x197/0x210 [ 417.086998] should_fail.cold+0xa/0x1b [ 417.090915] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 417.096053] ? lock_downgrade+0x880/0x880 [ 417.100236] __should_failslab+0x121/0x190 [ 417.104484] should_failslab+0x9/0x14 [ 417.108295] kmem_cache_alloc+0x2ae/0x700 [ 417.112465] ? retint_kernel+0x2d/0x2d [ 417.116377] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 417.121929] getname_kernel+0x53/0x370 [ 417.125828] kern_path+0x20/0x40 [ 417.129275] lookup_bdev.part.0+0x7b/0x1b0 [ 417.133523] ? blkdev_open+0x290/0x290 [ 417.137430] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 417.142205] blkdev_get_by_path+0x81/0x130 [ 417.146448] mount_bdev+0x5d/0x3c0 [ 417.150050] ? f2fs_commit_super+0x400/0x400 [ 417.150101] f2fs_mount+0x35/0x40 [ 417.158393] mount_fs+0xa8/0x31f [ 417.161792] vfs_kern_mount.part.0+0x6f/0x410 [ 417.166300] do_mount+0x53e/0x2bc0 [ 417.169858] ? copy_mount_string+0x40/0x40 [ 417.174125] ? _copy_from_user+0xdd/0x150 [ 417.178385] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 417.183927] ? copy_mount_options+0x280/0x3a0 [ 417.188441] ksys_mount+0xdb/0x150 [ 417.191998] __x64_sys_mount+0xbe/0x150 [ 417.195995] do_syscall_64+0xfd/0x620 [ 417.199811] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 417.205009] RIP: 0033:0x45a639 [ 417.208214] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 417.227127] RSP: 002b:00007f973be08c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 417.234855] RAX: ffffffffffffffda RBX: 00007f973be08c90 RCX: 000000000045a639 [ 417.242134] RDX: 0000000020000600 RSI: 00000000200003c0 RDI: 0000000020000380 [ 417.249413] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 417.256692] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f973be096d4 [ 417.263973] R13: 00000000004c71c0 R14: 00000000004dc948 R15: 0000000000000004 [ 417.286546] bond0: Enslaving bond_slave_1 as an active interface with an up link 05:38:16 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0xe], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x4c000000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:16 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x8], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080060005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:16 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0xffffffffffffff8e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000000)='./file0/../file0\x00', 0x0) 05:38:16 executing program 2 (fault-call:3 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) [ 417.461275] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 417.462536] SELinux: policydb string length 6291464 does not match expected length 8 [ 417.483176] FAULT_INJECTION: forcing a failure. [ 417.483176] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 417.495017] CPU: 0 PID: 21876 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 417.501956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.505220] SELinux: failed to load policy [ 417.511316] Call Trace: [ 417.511341] dump_stack+0x197/0x210 [ 417.511372] should_fail.cold+0xa/0x1b [ 417.511390] ? debug_smp_processor_id+0x1c/0x20 [ 417.511409] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 417.511429] ? mark_held_locks+0x100/0x100 [ 417.511453] __alloc_pages_nodemask+0x1ee/0x750 [ 417.539208] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 417.539754] ? __alloc_pages_slowpath+0x2870/0x2870 [ 417.539771] ? find_held_lock+0x35/0x130 05:38:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x60000000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080068005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 417.539800] cache_grow_begin+0x91/0x8c0 [ 417.564959] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 417.565301] SELinux: policydb string length 6291464 does not match expected length 8 [ 417.570508] ? check_preemption_disabled+0x48/0x290 [ 417.570531] kmem_cache_alloc+0x63b/0x700 [ 417.570556] getname_kernel+0x53/0x370 [ 417.578907] SELinux: failed to load policy [ 417.583535] kern_path+0x20/0x40 [ 417.583555] lookup_bdev.part.0+0x7b/0x1b0 [ 417.583567] ? blkdev_open+0x290/0x290 [ 417.583589] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 417.612006] blkdev_get_by_path+0x81/0x130 [ 417.616236] mount_bdev+0x5d/0x3c0 [ 417.619773] ? f2fs_commit_super+0x400/0x400 [ 417.624414] f2fs_mount+0x35/0x40 [ 417.627858] mount_fs+0xa8/0x31f [ 417.631211] vfs_kern_mount.part.0+0x6f/0x410 [ 417.635707] do_mount+0x53e/0x2bc0 [ 417.639242] ? copy_mount_string+0x40/0x40 [ 417.643466] ? _copy_from_user+0xdd/0x150 [ 417.647613] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 417.653143] ? copy_mount_options+0x280/0x3a0 [ 417.657630] ksys_mount+0xdb/0x150 [ 417.661160] __x64_sys_mount+0xbe/0x150 [ 417.665120] ? ksys_mount+0x150/0x150 [ 417.668913] do_syscall_64+0xfd/0x620 [ 417.672719] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 417.677898] RIP: 0033:0x45a639 [ 417.681094] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 417.699980] RSP: 002b:00007f973be08c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 417.707676] RAX: ffffffffffffffda RBX: 00007f973be08c90 RCX: 000000000045a639 [ 417.716579] RDX: 0000000020000600 RSI: 00000000200003c0 RDI: 0000000020000380 [ 417.723831] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 417.731088] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f973be096d4 [ 417.738346] R13: 00000000004c71c0 R14: 00000000004dc948 R15: 0000000000000004 [ 417.746767] net_ratelimit: 16 callbacks suppressed [ 417.746784] protocol 88fb is buggy, dev hsr_slave_0 [ 417.748110] protocol 88fb is buggy, dev hsr_slave_0 05:38:17 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0xa], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:17 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x11], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 417.752301] protocol 88fb is buggy, dev hsr_slave_1 [ 417.756847] protocol 88fb is buggy, dev hsr_slave_1 [ 417.815423] block nbd2: Attempted send on invalid socket [ 417.821049] print_req_error: I/O error, dev nbd2, sector 0 [ 417.836113] F2FS-fs (nbd2): Unable to read 1th superblock [ 417.874310] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 417.880085] SELinux: policydb string length 6815752 does not match expected length 8 [ 417.884850] block nbd2: Attempted send on invalid socket [ 417.895531] print_req_error: I/O error, dev nbd2, sector 8 [ 417.911777] F2FS-fs (nbd2): Unable to read 2th superblock [ 417.956028] block nbd2: Attempted send on invalid socket [ 417.959468] SELinux: failed to load policy [ 417.962061] print_req_error: I/O error, dev nbd2, sector 0 [ 417.974461] F2FS-fs (nbd2): Unable to read 1th superblock 05:38:17 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0xb], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x520100, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r4, 0xc0385650, &(0x7f0000000040)={{0x0, @addr=0x9}, 0x8, 0x6, 0x7}) r5 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x82) ioctl$KVM_SET_LAPIC(r6, 0x4400ae8f, &(0x7f0000000980)={"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"}) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = dup3(r3, r5, 0x0) ioctl$KVM_SET_SREGS(r6, 0x4138ae84, &(0x7f0000000340)={{}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc}, {0xf000, 0x2, 0xf, 0x0, 0x1f, 0x0, 0x1, 0x9}, {0x0, 0x0, 0x0, 0x0, 0xf9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {0x0, 0x6d376bdd10b65474, 0xc35ad70b97cf8ef1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64}, {0x0, 0x0, 0x9}, {0x4}, {0xf000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x1, 0x2]}) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) dup2(r7, r6) [ 418.008261] block nbd2: Attempted send on invalid socket [ 418.013852] print_req_error: I/O error, dev nbd2, sector 8 [ 418.020521] F2FS-fs (nbd2): Unable to read 2th superblock 05:38:17 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x68000000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:17 executing program 2 (fault-call:3 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf908006c005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 418.177280] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 418.256202] FAULT_INJECTION: forcing a failure. [ 418.256202] name failslab, interval 1, probability 0, space 0, times 0 [ 418.280845] SELinux: policydb string length 7077896 does not match expected length 8 [ 418.292550] CPU: 0 PID: 22020 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 418.299500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.301336] SELinux: failed to load policy [ 418.308852] Call Trace: [ 418.308898] dump_stack+0x197/0x210 [ 418.308920] should_fail.cold+0xa/0x1b [ 418.308940] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 418.328398] ? lock_downgrade+0x880/0x880 [ 418.332560] __should_failslab+0x121/0x190 [ 418.336812] should_failslab+0x9/0x14 [ 418.340609] kmem_cache_alloc_trace+0x2cc/0x760 [ 418.345292] ? lock_acquire+0x16f/0x3f0 [ 418.349278] selinux_sb_alloc_security+0x46/0x220 [ 418.354130] security_sb_alloc+0x63/0xa0 [ 418.358193] ? kill_litter_super+0x60/0x60 [ 418.362417] sget_userns+0x210/0xd30 [ 418.366118] ? kill_litter_super+0x60/0x60 [ 418.370341] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 418.375863] ? ns_test_super+0x50/0x50 [ 418.379744] ? ns_test_super+0x50/0x50 [ 418.383641] ? kill_litter_super+0x60/0x60 [ 418.387912] sget+0x10c/0x150 [ 418.391007] mount_bdev+0xff/0x3c0 [ 418.394530] ? f2fs_commit_super+0x400/0x400 [ 418.398928] f2fs_mount+0x35/0x40 [ 418.402366] mount_fs+0xa8/0x31f [ 418.405724] vfs_kern_mount.part.0+0x6f/0x410 [ 418.410209] do_mount+0x53e/0x2bc0 [ 418.413738] ? copy_mount_string+0x40/0x40 [ 418.417960] ? _copy_from_user+0xdd/0x150 [ 418.422094] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 418.427621] ? copy_mount_options+0x280/0x3a0 [ 418.432106] ksys_mount+0xdb/0x150 [ 418.435633] __x64_sys_mount+0xbe/0x150 [ 418.439596] do_syscall_64+0xfd/0x620 [ 418.443479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 418.448650] RIP: 0033:0x45a639 [ 418.451829] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 418.470720] RSP: 002b:00007f973be08c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 418.478415] RAX: ffffffffffffffda RBX: 00007f973be08c90 RCX: 000000000045a639 [ 418.485673] RDX: 0000000020000600 RSI: 00000000200003c0 RDI: 0000000020000380 [ 418.492929] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 418.500187] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f973be096d4 05:38:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x6c000000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080074005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:17 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0xd], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:17 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x28], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 418.507439] R13: 00000000004c71c0 R14: 00000000004dc948 R15: 0000000000000004 [ 418.607711] protocol 88fb is buggy, dev hsr_slave_0 [ 418.612857] protocol 88fb is buggy, dev hsr_slave_1 05:38:18 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0xe], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 418.660408] SELinux: policydb string length 7602184 does not match expected length 8 [ 418.667505] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 418.681449] SELinux: failed to load policy 05:38:18 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x60], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x74000000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev, 0x7}, 0x1c) setsockopt(0xffffffffffffffff, 0x0, 0x10000000000009, &(0x7f0000000180), 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0) getpid() recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x427c9ee3689df062, 0x0, 0x0, 0x3}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_hwaddr=@random="e02dcf12b367"}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, &(0x7f0000000580)=0x80) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000180)={@remote, 0x27}) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f00000000c0)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000340)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) getsockopt$TIPC_IMPORTANCE(r4, 0x10f, 0x7f, &(0x7f0000000000), &(0x7f00000000c0)=0x4) fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="73616375726974792e3ba333d18f976711b45fc906b4bf5b6ff173ec0a57d1e477ab3a000080efd577b092d90f1b9fc258de5ab9fe7ca4ad5f075c27687376502980d9660b15b14c3feaffc6eae503eae63c8d6f048bb7b44dfd94f717a36b5b6803fb5eeff60df29e23e6"]) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_bt_bnep_BNEPCONNADD(r4, 0x400442c8, &(0x7f0000003800)=ANY=[@ANYRES32=r5, @ANYBLOB="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"]) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, r3}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 05:38:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf908007a005345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:18 executing program 2 (fault-call:3 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:18 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x11], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:18 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x7a000000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 418.961102] SELinux: policydb string length 7995400 does not match expected length 8 [ 419.037925] SELinux: failed to load policy [ 419.054457] FAULT_INJECTION: forcing a failure. [ 419.054457] name failslab, interval 1, probability 0, space 0, times 0 [ 419.097711] protocol 88fb is buggy, dev hsr_slave_0 [ 419.102867] protocol 88fb is buggy, dev hsr_slave_1 [ 419.151987] CPU: 1 PID: 22270 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 419.158966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.168326] Call Trace: [ 419.170937] dump_stack+0x197/0x210 [ 419.174586] should_fail.cold+0xa/0x1b [ 419.178505] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 419.183630] ? lock_downgrade+0x880/0x880 [ 419.187802] ? kill_litter_super+0x60/0x60 [ 419.192050] __should_failslab+0x121/0x190 [ 419.196296] should_failslab+0x9/0x14 05:38:18 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000035345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:18 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x2], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 419.200112] kmem_cache_alloc_trace+0x2cc/0x760 [ 419.204793] ? do_raw_spin_unlock+0x178/0x270 [ 419.209296] ? kill_litter_super+0x60/0x60 [ 419.213536] sget_userns+0x11b/0xd30 [ 419.217264] ? kill_litter_super+0x60/0x60 [ 419.221518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.227070] ? ns_test_super+0x50/0x50 [ 419.230965] ? ns_test_super+0x50/0x50 [ 419.234849] ? kill_litter_super+0x60/0x60 [ 419.239083] sget+0x10c/0x150 [ 419.239117] mount_bdev+0xff/0x3c0 [ 419.239131] ? f2fs_commit_super+0x400/0x400 [ 419.239150] f2fs_mount+0x35/0x40 [ 419.239167] mount_fs+0xa8/0x31f [ 419.257013] vfs_kern_mount.part.0+0x6f/0x410 [ 419.261533] do_mount+0x53e/0x2bc0 [ 419.265094] ? copy_mount_string+0x40/0x40 [ 419.269439] ? _copy_from_user+0xdd/0x150 [ 419.273601] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 419.279155] ? copy_mount_options+0x280/0x3a0 [ 419.283661] ksys_mount+0xdb/0x150 [ 419.287214] __x64_sys_mount+0xbe/0x150 [ 419.291202] do_syscall_64+0xfd/0x620 [ 419.295020] entry_SYSCALL_64_after_hwframe+0x49/0xbe 05:38:18 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x28], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 419.295033] RIP: 0033:0x45a639 [ 419.295047] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 419.295058] RSP: 002b:00007f973be08c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 419.330041] RAX: ffffffffffffffda RBX: 00007f973be08c90 RCX: 000000000045a639 [ 419.337318] RDX: 0000000020000600 RSI: 00000000200003c0 RDI: 0000000020000380 [ 419.344601] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 05:38:18 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x48) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141045, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r3, r2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r4, 0x0, 0xedc0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r6, r5, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r5, r7, 0x0, 0xedc0) ioctl$KDSETLED(r7, 0x4b32, 0xa00000000000) ioctl$RTC_PIE_OFF(r1, 0x7006) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f00000002c0)=""/210, &(0x7f0000000040)=0xd2) fcntl$setstatus(r0, 0x4, 0x4000) io_setup(0x2, &(0x7f0000000280)=0x0) io_submit(r8, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00, 0x600}]) write$binfmt_elf32(r5, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0xff, 0x86, 0x0, 0x3, 0x80, 0x2, 0x6, 0x6, 0x24e, 0x38, 0x1dc, 0x4e4d, 0x200, 0x20, 0x1, 0x20, 0x7, 0x4}, [{0x1, 0x50, 0x9, 0x3, 0x7f, 0x9, 0x0, 0x9}], "853ce6d0351144aca7d2769d3dc8f681", [[], []]}, 0x268) 05:38:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x9effffff, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 419.351882] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f973be096d4 [ 419.359160] R13: 00000000004c71c0 R14: 00000000004dc948 R15: 0000000000000004 [ 419.405650] SELinux: policydb string length 50331656 does not match expected length 8 [ 419.407784] protocol 88fb is buggy, dev hsr_slave_0 [ 419.417437] SELinux: failed to load policy [ 419.418882] protocol 88fb is buggy, dev hsr_slave_1 05:38:18 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x3], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:19 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x60], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:19 executing program 2 (fault-call:3 fault-nth:10): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000055345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0xa0010000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 419.668709] SELinux: policydb string length 83886088 does not match expected length 8 [ 419.711585] SELinux: failed to load policy 05:38:19 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x4], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:19 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 419.732394] FAULT_INJECTION: forcing a failure. [ 419.732394] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 419.744249] CPU: 1 PID: 22516 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 419.751191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.760685] Call Trace: [ 419.763293] dump_stack+0x197/0x210 [ 419.766948] should_fail.cold+0xa/0x1b [ 419.770863] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 419.776510] ? mark_held_locks+0x100/0x100 05:38:19 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x5], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 419.780776] __alloc_pages_nodemask+0x1ee/0x750 [ 419.785529] ? __alloc_pages_slowpath+0x2870/0x2870 [ 419.790580] cache_grow_begin+0x91/0x8c0 [ 419.794655] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 419.800209] ? check_preemption_disabled+0x48/0x290 [ 419.805257] kmem_cache_alloc_trace+0x685/0x760 [ 419.809947] ? kill_litter_super+0x60/0x60 [ 419.814193] sget_userns+0x11b/0xd30 [ 419.817913] ? kill_litter_super+0x60/0x60 [ 419.822166] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.827716] ? ns_test_super+0x50/0x50 05:38:19 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x2], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 419.831626] ? ns_test_super+0x50/0x50 [ 419.835520] ? kill_litter_super+0x60/0x60 [ 419.839766] sget+0x10c/0x150 [ 419.842888] mount_bdev+0xff/0x3c0 [ 419.846439] ? f2fs_commit_super+0x400/0x400 [ 419.850895] f2fs_mount+0x35/0x40 [ 419.854468] mount_fs+0xa8/0x31f [ 419.857875] vfs_kern_mount.part.0+0x6f/0x410 [ 419.862410] do_mount+0x53e/0x2bc0 [ 419.862433] ? copy_mount_string+0x40/0x40 [ 419.870205] ? _copy_from_user+0xdd/0x150 [ 419.870227] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 419.870243] ? copy_mount_options+0x280/0x3a0 [ 419.870278] ksys_mount+0xdb/0x150 [ 419.870314] __x64_sys_mount+0xbe/0x150 [ 419.870334] do_syscall_64+0xfd/0x620 [ 419.870358] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 419.870370] RIP: 0033:0x45a639 [ 419.870399] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 419.870408] RSP: 002b:00007f973be08c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 05:38:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0xf0ffffff, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 419.870435] RAX: ffffffffffffffda RBX: 00007f973be08c90 RCX: 000000000045a639 [ 419.870443] RDX: 0000000020000600 RSI: 00000000200003c0 RDI: 0000000020000380 [ 419.870454] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 419.895887] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f973be096d4 [ 419.895897] R13: 00000000004c71c0 R14: 00000000004dc948 R15: 0000000000000004 [ 419.943784] block nbd2: Attempted send on invalid socket [ 419.974812] print_req_error: I/O error, dev nbd2, sector 0 [ 419.981796] F2FS-fs (nbd2): Unable to read 1th superblock [ 420.029530] block nbd2: Attempted send on invalid socket [ 420.035104] print_req_error: I/O error, dev nbd2, sector 8 [ 420.041763] F2FS-fs (nbd2): Unable to read 2th superblock 05:38:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000065345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:19 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x3], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0xfffff000, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:19 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x6], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 420.129760] block nbd2: Attempted send on invalid socket [ 420.135330] print_req_error: I/O error, dev nbd2, sector 0 [ 420.141802] F2FS-fs (nbd2): Unable to read 1th superblock [ 420.201310] block nbd2: Attempted send on invalid socket [ 420.205599] SELinux: policydb string length 100663304 does not match expected length 8 [ 420.206852] print_req_error: I/O error, dev nbd2, sector 8 [ 420.221316] F2FS-fs (nbd2): Unable to read 2th superblock 05:38:19 executing program 2 (fault-call:3 fault-nth:11): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:19 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$inet6(0xa, 0x3, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r3, r2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r4, 0x0, 0xedc0) r5 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={r7}, 0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f00000000c0)={r7, 0x9a, 0x0, 0x0, 0x3}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000005c0)={r8, @in={{0x2, 0x4e20, @local}}}, 0x84) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x4000, 0x0) ioctl$EVIOCGEFFECTS(r9, 0x80044584, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r10, 0x40086607, &(0x7f00000001c0)) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)) socket(0x8, 0x2, 0x0) setuid(0x0) socket(0x10, 0x0, 0x0) r11 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/checkreqprot\x00', 0x20000, 0x0) accept4$tipc(r11, 0x0, &(0x7f0000000440), 0x0) r12 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$sock_cred(r12, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) lsetxattr$security_smack_transmute(0x0, &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f00000003c0)='TRUE', 0x4, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="a7724bdef64346b903000000000000abf9d14000000000000000040088639c525503000000000000009eef0000000000000200000040847bf22adf06000000"], 0x3f) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 05:38:19 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x7], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:19 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x4], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0xffffff7f, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000075345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:20 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x8], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 420.481067] FAULT_INJECTION: forcing a failure. [ 420.481067] name failslab, interval 1, probability 0, space 0, times 0 [ 420.559481] CPU: 0 PID: 22762 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 420.566461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.575823] Call Trace: [ 420.578424] dump_stack+0x197/0x210 [ 420.582073] should_fail.cold+0xa/0x1b [ 420.585981] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 420.591100] ? lock_downgrade+0x880/0x880 [ 420.595280] __should_failslab+0x121/0x190 [ 420.599531] should_failslab+0x9/0x14 [ 420.603335] kmem_cache_alloc_trace+0x2cc/0x760 [ 420.607242] SELinux: policydb string length 117440520 does not match expected length 8 [ 420.608020] ? lock_acquire+0x1ea/0x3f0 [ 420.608042] selinux_sb_alloc_security+0x46/0x220 [ 420.624973] security_sb_alloc+0x63/0xa0 [ 420.629045] ? kill_litter_super+0x60/0x60 [ 420.633286] sget_userns+0x210/0xd30 [ 420.636258] sel_write_load: 1 callbacks suppressed [ 420.636262] SELinux: failed to load policy [ 420.637005] ? kill_litter_super+0x60/0x60 [ 420.650374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 420.655921] ? ns_test_super+0x50/0x50 [ 420.659817] ? ns_test_super+0x50/0x50 [ 420.663715] ? kill_litter_super+0x60/0x60 [ 420.668054] sget+0x10c/0x150 [ 420.671176] mount_bdev+0xff/0x3c0 [ 420.674725] ? f2fs_commit_super+0x400/0x400 [ 420.679154] f2fs_mount+0x35/0x40 [ 420.682629] mount_fs+0xa8/0x31f [ 420.686019] vfs_kern_mount.part.0+0x6f/0x410 [ 420.690535] do_mount+0x53e/0x2bc0 [ 420.694096] ? copy_mount_string+0x40/0x40 [ 420.698350] ? _copy_from_user+0xdd/0x150 [ 420.702510] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 420.708059] ? copy_mount_options+0x280/0x3a0 [ 420.712560] ksys_mount+0xdb/0x150 [ 420.716088] __x64_sys_mount+0xbe/0x150 [ 420.720060] do_syscall_64+0xfd/0x620 [ 420.723855] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 420.729026] RIP: 0033:0x45a639 [ 420.732209] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 420.751098] RSP: 002b:00007f973be08c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 05:38:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000205345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 420.758915] RAX: ffffffffffffffda RBX: 00007f973be08c90 RCX: 000000000045a639 [ 420.766171] RDX: 0000000020000600 RSI: 00000000200003c0 RDI: 0000000020000380 [ 420.773426] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 420.780686] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f973be096d4 [ 420.787950] R13: 00000000004c71c0 R14: 00000000004dc948 R15: 0000000000000004 05:38:20 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0xa], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:20 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x5], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 420.837115] validate_nla: 6 callbacks suppressed [ 420.837124] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 05:38:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0xffffff9e, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 420.920842] SELinux: policydb string length 536870920 does not match expected length 8 [ 420.961174] SELinux: failed to load policy 05:38:20 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x6], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:20 executing program 2 (fault-call:3 fault-nth:12): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) [ 421.040980] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 421.265058] FAULT_INJECTION: forcing a failure. [ 421.265058] name failslab, interval 1, probability 0, space 0, times 0 [ 421.304579] CPU: 1 PID: 23010 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 421.311576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.320946] Call Trace: [ 421.323560] dump_stack+0x197/0x210 [ 421.327254] should_fail.cold+0xa/0x1b [ 421.331164] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 421.336290] ? lock_downgrade+0x880/0x880 [ 421.340471] __should_failslab+0x121/0x190 [ 421.344728] should_failslab+0x9/0x14 [ 421.348618] __kmalloc+0x2e2/0x750 [ 421.352149] ? __lockdep_init_map+0x10c/0x5b0 [ 421.356640] ? prealloc_shrinker+0xdf/0x340 [ 421.360950] prealloc_shrinker+0xdf/0x340 [ 421.365087] sget_userns+0x7ec/0xd30 [ 421.368788] ? kill_litter_super+0x60/0x60 [ 421.373007] ? ns_test_super+0x50/0x50 [ 421.376877] ? ns_test_super+0x50/0x50 [ 421.380749] ? kill_litter_super+0x60/0x60 [ 421.384968] sget+0x10c/0x150 [ 421.388064] mount_bdev+0xff/0x3c0 [ 421.391632] ? f2fs_commit_super+0x400/0x400 [ 421.396082] f2fs_mount+0x35/0x40 [ 421.399524] mount_fs+0xa8/0x31f [ 421.402880] vfs_kern_mount.part.0+0x6f/0x410 [ 421.407361] do_mount+0x53e/0x2bc0 [ 421.410890] ? copy_mount_string+0x40/0x40 [ 421.415109] ? _copy_from_user+0xdd/0x150 [ 421.419260] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 421.424783] ? copy_mount_options+0x280/0x3a0 [ 421.429268] ksys_mount+0xdb/0x150 [ 421.432792] __x64_sys_mount+0xbe/0x150 [ 421.436806] do_syscall_64+0xfd/0x620 [ 421.440602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 421.445777] RIP: 0033:0x45a639 05:38:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0xfffffff0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:21 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0xb], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000485345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 421.448956] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 421.467893] RSP: 002b:00007f973be08c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 421.475587] RAX: ffffffffffffffda RBX: 00007f973be08c90 RCX: 000000000045a639 [ 421.482842] RDX: 0000000020000600 RSI: 00000000200003c0 RDI: 0000000020000380 [ 421.490222] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 421.497485] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f973be096d4 [ 421.504750] R13: 00000000004c71c0 R14: 00000000004dc948 R15: 0000000000000004 05:38:21 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x7], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:21 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r1) socket$kcm(0xa, 0x922000000003, 0x11) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x1) dup3(r4, r3, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r5, 0x0, 0xedc0) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0)=r5, 0x4) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r7, r6, 0x0) ioctl$FS_IOC_GETFLAGS(r7, 0x80086601, &(0x7f0000000000)) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000680)=@nl=@proc={0x10, 0x0, 0x25dfdbfb, 0x800200}, 0x80, &(0x7f0000001680)=[{&(0x7f0000000100)="b9ef265280c34977bb7e11b0c89aef4223127af63983d6ce5b8b3b2d15f9a4f8cc5d", 0x22}, {&(0x7f0000001700)="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", 0x1001}, {&(0x7f0000000600)="3cc2eb435bb533b1f5808852c1347b0cad9c72ca1b83baab7d2ce364fc5e274e40f07d6bff3fd9f27c49b41bcf4791ce2a2154c6a86802abbd8089a2e54e375e639991a1da", 0x45}, {&(0x7f00000002c0)="8d92061c9acc2176c6a3e90234ad39a7c8f558d043947051603147df69324feeaa52616b6068b72884a20328311ceab83676764a0c76a55a591abe67230e357ba69230337433cb5d854fd51c9ed7fc1fd86f5f86eccb746cc51e2dd912cc6a6373c2dfa642", 0x65}, {&(0x7f0000000340)="9931725bbb89bbe83a9f4824d18b7a97cc90caac1fdf3800e1c7fbe878af65e344abf0fdddabcf5cc5091a53e6759db1fffd1c62744f1c4399784517eb740c74cbdadc9c45fcfce74f9a1b5df2a5fcd7da2c01e67f52aba42171fa3decca131ac9d054269f45469febb84d421ded51e4b62483370b8da06178e3987c4b1df986e5cf51d8d60cd7e8106908de2102a2b5c68941d2", 0x94}, {&(0x7f0000000480)="47f2d02f30c4e2efd074b68b86ae5f560e333913ed671b51e6f88ba7161f9ec97def92d92a00b862ee76d54ef4c3e7dce3da5a09da96e7c0dca89b29fdf82ecc2b2bffa1c40ebc0e0befad43dcc8d27980a45430b238b3e7c54ec7c00d9449f6a764e5728e42265ffdfa7e555c183ab8da37774d1fe4fb3b7d75a6a65336865ca76d8b31ad1ffdb85b7633f5c1b1461c2244a83db7c034ddcbff234374dd4ce4a1eedcd2bd98e0ee37f235cee55e", 0xae}, {&(0x7f0000000540)="b47a19044c692f8d76eedde1228e24017b85a96e2cdeae198e52720f0a77de84d510b949367ec216524183e6c2b1b45963bab672cbaa6417a7c55da3ea948a0290282a481de70fd4a87851a3ce6fb81574b50cb8ae6b701abb4b92476b8e5ed31f8cd07cffb5282b9360fae73be1104b8fbb8bd521e227ff826b55c29ada4a47a9d2f7d6892806a3def4404e349dd9592c8f76d82228", 0x96}], 0x7}, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r9, r8, 0x0) connect$inet6(r8, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r10 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r8, r10, 0x0, 0xedc0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r10, 0x84, 0x12, &(0x7f0000000180), &(0x7f00000001c0)=0x4) [ 421.563871] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 421.582491] SELinux: policydb string length 1207959560 does not match expected length 8 [ 421.635957] SELinux: failed to load policy 05:38:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0xffffffff, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:21 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0xd], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:21 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x8], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:21 executing program 2 (fault-call:3 fault-nth:13): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf90800004c5345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 421.839198] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 05:38:21 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0xa], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:21 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0xe], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 421.904633] SELinux: policydb string length 1275068424 does not match expected length 8 [ 421.936433] SELinux: failed to load policy 05:38:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="0a00000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 421.975066] FAULT_INJECTION: forcing a failure. [ 421.975066] name failslab, interval 1, probability 0, space 0, times 0 05:38:21 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup3(r1, r0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x3d, 0xff, "991729b0431d48a119adedfbf137c8a9c43f8992f02251e19db753b23ec8019d32b5ccc44f3b77e942cad6c6cae11fb18fe600e9e3"}, 0x800) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r5, r4, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r6, 0x0, 0xedc0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f00000000c0)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000240)={r7, 0x101, 0x104, 0x6, 0x5, 0x5}, 0x14) r8 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x500, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv6_newaddr={0x2c, 0x14, 0x509, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r9}, [@IFA_LOCAL={0x14, 0x2, @local}]}, 0x2c}}, 0x0) [ 422.067366] CPU: 0 PID: 23145 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 422.074373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.083744] Call Trace: [ 422.086357] dump_stack+0x197/0x210 [ 422.090019] should_fail.cold+0xa/0x1b [ 422.093941] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 422.099066] ? lock_downgrade+0x880/0x880 [ 422.103246] __should_failslab+0x121/0x190 [ 422.107495] should_failslab+0x9/0x14 [ 422.111303] kmem_cache_alloc_node_trace+0x274/0x720 05:38:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000605345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 422.116421] __kmalloc_node+0x3d/0x80 [ 422.120242] kvmalloc_node+0x68/0x100 [ 422.124066] __list_lru_init+0x4d9/0x720 [ 422.128144] sget_userns+0x81b/0xd30 [ 422.131864] ? kill_litter_super+0x60/0x60 [ 422.136108] ? ns_test_super+0x50/0x50 [ 422.140000] ? ns_test_super+0x50/0x50 [ 422.143887] ? kill_litter_super+0x60/0x60 [ 422.148127] sget+0x10c/0x150 [ 422.151248] mount_bdev+0xff/0x3c0 [ 422.154798] ? f2fs_commit_super+0x400/0x400 [ 422.159217] f2fs_mount+0x35/0x40 [ 422.162676] mount_fs+0xa8/0x31f [ 422.166054] vfs_kern_mount.part.0+0x6f/0x410 [ 422.170561] do_mount+0x53e/0x2bc0 [ 422.174120] ? copy_mount_string+0x40/0x40 [ 422.178363] ? _copy_from_user+0xdd/0x150 [ 422.182520] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 422.188069] ? copy_mount_options+0x280/0x3a0 [ 422.192585] ksys_mount+0xdb/0x150 [ 422.196137] __x64_sys_mount+0xbe/0x150 [ 422.200119] ? do_syscall_64+0x5b/0x620 [ 422.204102] do_syscall_64+0xfd/0x620 [ 422.207915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 422.213105] RIP: 0033:0x45a639 [ 422.216302] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 422.235214] RSP: 002b:00007f973be08c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 422.242939] RAX: ffffffffffffffda RBX: 00007f973be08c90 RCX: 000000000045a639 [ 422.250220] RDX: 0000000020000600 RSI: 00000000200003c0 RDI: 0000000020000380 [ 422.257496] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 422.264772] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f973be096d4 [ 422.272053] R13: 00000000004c71c0 R14: 00000000004dc948 R15: 0000000000000004 05:38:21 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0xb], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="0f00000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:21 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x11], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 422.419603] SELinux: policydb string length 1610612744 does not match expected length 8 [ 422.497540] SELinux: failed to load policy 05:38:22 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x14107c, 0xa0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x49f) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) utime(&(0x7f0000000840)='./bus\x00', &(0x7f0000000100)={0x0, 0xfffffffffffffffd}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x202001, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000300)={0x0, {{0x2, 0x4e20}}, 0x0, 0x1, [{{0x2, 0x0, @remote}}]}, 0x110) 05:38:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="1400000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:22 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, r0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r4, r3, 0x0) sendfile(r0, r4, 0x0, 0xedc0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r6, r5, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r5, r7, 0x0, 0xedc0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r7, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)=""/196, 0xc4, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r2, 0x10, &(0x7f00000003c0)={&(0x7f0000000180)=""/98, 0x62, r8}}, 0x10) r9 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r10 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r11 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x20800, 0x0) fcntl$lock(r11, 0x7, &(0x7f00000000c0)={0x2, 0x7, 0x1, 0x9}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r12 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r13 = fanotify_init(0x0, 0x0) fanotify_mark(r13, 0x2000000000000011, 0x2, r12, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r9, &(0x7f0000000600)="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", 0x200) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') pipe(&(0x7f0000000280)) open(0x0, 0x0, 0x0) sendfile(r9, r10, 0x0, 0x44ee) 05:38:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000685345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:22 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0xd], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:22 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2500000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 422.847723] net_ratelimit: 14 callbacks suppressed [ 422.847733] protocol 88fb is buggy, dev hsr_slave_0 [ 422.857892] protocol 88fb is buggy, dev hsr_slave_1 [ 422.990964] SELinux: policydb string length 1744830472 does not match expected length 8 [ 422.999461] audit: type=1800 audit(1574141902.463:4534): pid=23401 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16721 res=0 05:38:22 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0xe], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 423.040662] block nbd2: Attempted send on invalid socket [ 423.046291] print_req_error: I/O error, dev nbd2, sector 0 [ 423.062957] SELinux: failed to load policy [ 423.068196] F2FS-fs (nbd2): Unable to read 1th superblock 05:38:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="5200000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 423.129087] block nbd2: Attempted send on invalid socket [ 423.134662] print_req_error: I/O error, dev nbd2, sector 8 [ 423.141234] F2FS-fs (nbd2): Unable to read 2th superblock [ 423.191686] block nbd2: Attempted send on invalid socket [ 423.197243] print_req_error: I/O error, dev nbd2, sector 0 [ 423.203974] F2FS-fs (nbd2): Unable to read 1th superblock [ 423.217442] block nbd2: Attempted send on invalid socket [ 423.223031] print_req_error: I/O error, dev nbd2, sector 8 [ 423.229038] F2FS-fs (nbd2): Unable to read 2th superblock 05:38:22 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x28], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 423.247744] protocol 88fb is buggy, dev hsr_slave_0 [ 423.252859] protocol 88fb is buggy, dev hsr_slave_1 05:38:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf90800006c5345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 423.294526] audit: type=1804 audit(1574141902.463:4535): pid=23401 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir236754625/syzkaller.omzjAi/249/file0" dev="sda1" ino=16721 res=1 05:38:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="6000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:22 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x60], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'5dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) [ 423.420280] audit: type=1804 audit(1574141902.473:4536): pid=23401 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir236754625/syzkaller.omzjAi/249/file0" dev="sda1" ino=16721 res=1 05:38:23 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x11], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="c000000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 423.544144] SELinux: policydb string length 1811939336 does not match expected length 8 [ 423.567701] protocol 88fb is buggy, dev hsr_slave_0 [ 423.572863] protocol 88fb is buggy, dev hsr_slave_1 05:38:23 executing program 0: syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r2, r1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r3, 0x0, 0xedc0) setsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000040)=0x3e, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioprio_get$uid(0x3, r4) syz_read_part_table(0xfffffffffffffffd, 0x0, &(0x7f0000000200)) [ 423.620556] SELinux: failed to load policy 05:38:23 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:23 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 423.684232] audit: type=1804 audit(1574141902.803:4537): pid=23401 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir236754625/syzkaller.omzjAi/249/file0" dev="sda1" ino=16721 res=1 05:38:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000745345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="c00e000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:23 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x28], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 423.967709] protocol 88fb is buggy, dev hsr_slave_0 [ 423.972908] protocol 88fb is buggy, dev hsr_slave_1 05:38:23 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000240)=@bridge_getneigh={0x28, 0x1e, 0x601, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8, 0xd, 0x2}]}, 0x28}}, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='\x00\x01\x00\x00\x04') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x200, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10004002}, 0x800) getpid() openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="ffc8ffffffff0180c200000086dd6006f52e00081100fe8000000000000020000000000000ffff020000000043c2406335fa20cd00000000000d000000014f4d07bf82c5698b1e59df27291e9de619ce4f4a644b878698907bf00f60a6e872e81f8464df69876b6318e372a83156719f9f30a3359a675128d82b1ea203f92a6504fb150f14191f876c99316184186219c3e3388779b88398e130f570f354ca1da8f15096eedde8f6be5a710cbd4a0ba54ec55ff6bb996cfac9ce96ba3e05e9a5ac378f9cabce5325288134819326f3447cf64ab04f00000000"], 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) 05:38:23 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x2], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 424.021423] SELinux: policydb string length 1946157064 does not match expected length 8 [ 424.047776] protocol 88fb is buggy, dev hsr_slave_0 [ 424.052940] protocol 88fb is buggy, dev hsr_slave_1 05:38:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="e03f030039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 424.094284] SELinux: failed to load policy 05:38:23 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x3], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:23 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x60], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'=dev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) [ 424.303019] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23789 comm=syz-executor.0 05:38:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="a000002039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf90800007a5345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 424.433918] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23789 comm=syz-executor.0 [ 424.518377] SELinux: policydb string length 2046820360 does not match expected length 8 05:38:24 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:24 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x4], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 424.563278] SELinux: failed to load policy 05:38:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="00f0ff7f39002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xa8) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext={0x0, 0x400000000}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000380)='memory.events\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000002c0)=':\x00', 0xffffffffffffffff}, 0x30) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/autofs\x00', 0x2400, 0x0) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000580)='eth0nodev\x00', r5}, 0xe86c7152ff9d9e1) recvmsg(r4, 0x0, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x12}, 0x14) socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x541b, &(0x7f0000000000)) r7 = socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x890b, &(0x7f0000000000)) socket$kcm(0xa, 0x2, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r9, r8, 0x0) connect$inet6(r8, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r10 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r8, r10, 0x0, 0xedc0) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, &(0x7f0000000000)) r11 = socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x890b, &(0x7f0000000000)) r12 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='hugetlb.2MB.usage_in_Rytes\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r12, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r12, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000080), 0xfffffffffffffd69) socket$kcm(0xa, 0x2, 0x11) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000007640)={&(0x7f0000007380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000007500)=[{&(0x7f0000007400)=""/193, 0xc1}], 0x1, &(0x7f00000005c0)=""/217, 0xd9}, 0x3) recvmsg(0xffffffffffffffff, &(0x7f000000c0c0)={&(0x7f000000a880)=@xdp={0x2c, 0x0, 0x0}, 0xffffffad, &(0x7f000000c000)}, 0x1) r15 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(r15, 0x0, 0x0, 0x0) r16 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r16, 0x400454ca, &(0x7f0000000300)={'ip6gretap0\x00', 0x1132}) ioctl$SIOCSIFHWADDR(r16, 0x8924, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c1c0)={0x16, 0x1, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRESDEC=r16, @ANYRESOCT=r13, @ANYRES16=0x0]], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], r14, 0x0, r15, 0x8, &(0x7f000000c140)={0x6}, 0x8, 0x10, &(0x7f000000c180)={0x4, 0x7, 0x0, 0x9}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xc, 0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x2, [], r14, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000140), 0x8, 0x10, &(0x7f0000000280)={0x3, 0xe, 0xfff, 0x7fff}, 0x10}, 0x70) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000007680)=r14) socket$kcm(0xa, 0x5, 0x0) 05:38:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000020045204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:24 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:24 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x5], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="effdffff39002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/\nev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) [ 424.929624] SELinux: policydb string length 33554440 does not match expected length 8 [ 424.981755] SELinux: failed to load policy 05:38:24 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:24 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x6], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000000f002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000040045204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:24 executing program 0: r0 = socket$inet(0x2, 0x2000080001, 0x84) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0x1ff}, 0x8) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x4352}], 0x1}, 0x2000) socket(0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7fff, 0x2101) ioctl$TIOCGSERIAL(r1, 0x541e, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)}) 05:38:24 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2002000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 425.329671] SELinux: policydb string length 67108872 does not match expected length 8 05:38:24 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x7], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/#ev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:25 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x5], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2003000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000000a45204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:25 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x8], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2004000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:25 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x6], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 425.751505] SELinux: policydb string [ 425.751505] E Linux does not match my string SE Linux 05:38:25 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0xa], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 425.824984] sel_write_load: 1 callbacks suppressed [ 425.824989] SELinux: failed to load policy 05:38:25 executing program 0: getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0xe9484f786a3bb8e4, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0)="240000001a0025f00485bc04fef7001d020b49ffed00000080032800080003000100", 0x22) socket(0x0, 0x400000000080803, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x204, 0x1f, 0x0, 0x1, 0x5, 0x7, 0x0}, &(0x7f0000000200)=0x20) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r0}, 0x8) getpid() sched_setscheduler(0xffffffffffffffff, 0x3, &(0x7f00000001c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r2 = accept4(r1, &(0x7f0000001140)=@alg, 0x0, 0x800) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000001200)=@assoc_value={0x0, 0x100006}, &(0x7f0000001240)=0x8) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x0, &(0x7f00000000c0)="0800a1695e1d") r4 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r5, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r5, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 05:38:25 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2005000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000002545204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/%ev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:25 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0xb], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 426.333280] SELinux: policydb string %E Linux does not match my string SE Linux 05:38:25 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0xd], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:25 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2006000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 426.374200] SELinux: failed to load policy 05:38:26 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xa], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000025345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2007000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 426.735547] SELinux: policydb string length 33554440 does not match expected length 8 [ 426.779052] SELinux: failed to load policy 05:38:26 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xb], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:26 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0xe], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/*ev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="200f000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:26 executing program 0: open(&(0x7f0000000040)='./file1\x00', 0x140, 0x25) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x40, 0x0) r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000340)=ANY=[@ANYBLOB="9ab8ea0100804a0b37de8977c94e6445a9f63c9da1a4623ccbd24837ae51ed5a38e121436e32ea1b643bc3ea87301ec3616caab5b52d4f358852abd18aa53492bae79dd86a590c24f7b8ff4c8a330ea3d776306975680a21ec7752f7345d7cf9b26721d83605e9af8e33e980a161e8ba8b6cb8d9cc2e286fda89ce5a8b9179c48dff3f4d098df33555dd17452872ea0a5f1b754cf06fc1e635003b468c1ac953aaaf518b7363425a8ff0ecf4c3cce5b1830a170a6af15fa5149a58d9015a3cd4070eb9560ebbf0c467569bd0dcbdefaffe7bb570080710a8f704a72731", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={r3}, 0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={r3, 0x1}, 0x8) r4 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r6, r5, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r5, r7, 0x0, 0xedc0) ioctl$USBDEVFS_GET_CAPABILITIES(r7, 0x8004551a, &(0x7f0000000140)) execveat(r4, &(0x7f0000000200)='./file1\x00', 0x0, 0x0, 0x0) 05:38:26 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xd], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000035345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2048000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:26 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x11], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:26 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xe], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 427.110012] SELinux: policydb string length 50331656 does not match expected length 8 [ 427.148600] SELinux: failed to load policy 05:38:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="204c000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:26 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/+ev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000045345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:26 executing program 0: bind$alg(0xffffffffffffffff, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0xfffffffffffffcc3, 0x6, 0x1, 0x4}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x7, 0x70, 0x0, 0x69, 0x4, 0x86, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180), 0x750be9bd21a9698e}, 0x0, 0x8001, 0x101, 0x10, 0x3e, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x8000000000000000) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r4, r3, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r5, 0x0, 0xedc0) ioctl$sock_inet_SIOCDELRT(r5, 0x890c, &(0x7f00000003c0)={0x0, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xa}}, {0x2, 0x4e21, @remote}, {0x2, 0x4e21, @empty}, 0x8, 0x0, 0x0, 0x0, 0x44b, &(0x7f00000001c0)='veth1_to_bridge\x00', 0xfffffffffffffff8, 0x6, 0x3c}) fchdir(r2) socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) uselib(0x0) io_setup(0x1ff, &(0x7f00000004c0)) modify_ldt$write2(0x11, &(0x7f0000000080)={0x8000, 0xffffffffffffffff, 0x1000, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000580)="e25160202e742bf72e1d7a58fa656c0cbe68b263ca1cb5d7c5d11568086926aa008317f810c8f3b57c1bc5289b9c21c00e891e8a7124ef2ddb13207b5940a4df00000000000000a2f74019ee5c2a648dce21fc421f0cfa4ea410fbd19b9b285b133f2be881e4d5cb102f12e431bb75fdd85c99633ba065dab325062e9ac9197e46887cd0d584f06df79b2f9082ac4c05c5259faa", 0x94}]) semget(0x1, 0x0, 0x2) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) r7 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x7fff) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 05:38:26 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x11], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2060000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 427.490961] SELinux: policydb string length 67108872 does not match expected length 8 05:38:27 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x28], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:27 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 427.608698] SELinux: failed to load policy 05:38:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2068000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:27 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x28], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:27 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x60], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000055345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="206c000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/-ev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:27 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x60], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 428.032807] SELinux: policydb string length 83886088 does not match expected length 8 05:38:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2074000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 428.076901] SELinux: failed to load policy 05:38:27 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 428.127730] net_ratelimit: 16 callbacks suppressed [ 428.127739] protocol 88fb is buggy, dev hsr_slave_0 [ 428.137929] protocol 88fb is buggy, dev hsr_slave_1 05:38:27 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3ff, 0x400) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r3, r2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r4, 0x0, 0xedc0) setsockopt$CAN_RAW_FILTER(r4, 0x65, 0x1, &(0x7f0000000080)=[{{0x1, 0x1}, {0x2, 0x0, 0x1, 0x1}}, {{0x1, 0x0, 0x0, 0x1}, {0x0, 0x1, 0x0, 0x1}}, {{0x100, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x1}}, {{0x4, 0x1, 0x0, 0x1}, {0x4}}, {{0x0, 0x0, 0x1, 0x1}, {0x0, 0x0, 0x1}}, {{0x2, 0x1, 0x1, 0x1}, {0x3}}, {{0x1, 0x1, 0x1, 0x1}, {0x0, 0x0, 0x0, 0x1}}], 0x38) r5 = inotify_init() r6 = inotify_add_watch(r5, &(0x7f0000000240)='.\x00', 0xc0000080) r7 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0)=0x8, r7, &(0x7f0000000140)=0xfff, 0x2, 0x0) inotify_rm_watch(r5, r6) inotify_rm_watch(r1, r6) r8 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0x8, 0x2, 0x1, 0x7f, 0x0, 0xfffffffffffeffff, 0x80100, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0x100000000}, 0x0, 0x3f, 0x2, 0x8, 0x629, 0x80000000, 0x2}, 0x0, 0xf, r8, 0xa) 05:38:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000065345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 428.207769] protocol 88fb is buggy, dev hsr_slave_0 [ 428.212944] protocol 88fb is buggy, dev hsr_slave_1 05:38:27 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x300, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="207a000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:27 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:27 executing program 0: getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r3, r2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r4, 0x0, 0xedc0) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000000)=0x1000000, 0x4) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="24000000260007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 428.405431] SELinux: policydb string length 100663304 does not match expected length 8 [ 428.433141] SELinux: failed to load policy 05:38:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/.ev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:28 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x500, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:28 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="20f0000039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000075345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 428.705029] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 05:38:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000030039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:28 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:28 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x600, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:28 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x700, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2028030039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:28 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x5], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 429.087927] protocol 88fb is buggy, dev hsr_slave_0 [ 429.093062] protocol 88fb is buggy, dev hsr_slave_1 05:38:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000050039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:28 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x802, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:28 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x6], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'//ev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000485345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:28 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100007}, 0x80, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) memfd_create(0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) read(0xffffffffffffffff, 0x0, 0x600) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000001480)={{0x3, 0x3, 0xe9, 0x5, 'syz1\x00', 0x2}, 0x1, [0x9dc0000000, 0x9, 0x2, 0x2000000000000000, 0x80000001, 0x80000001, 0x9, 0x2, 0x7, 0x1, 0x8, 0x800, 0x59ca, 0x8, 0x776, 0x0, 0x3, 0xfffffffffffffff7, 0x17c00000000000, 0xf2d, 0xffffffff, 0x401, 0x800, 0x1, 0x4b2, 0x20, 0x5, 0x800, 0x21f9, 0x1ff, 0x1, 0x3ff, 0x2, 0x3, 0x6, 0x1f, 0xfff, 0x1, 0x9, 0x100000001, 0x8, 0x3f, 0x3, 0x80, 0x4d6a5fb8, 0x40, 0xa9, 0xffffffffffffff80, 0xf, 0x1, 0x5, 0x3, 0x1, 0x1f, 0x7, 0x401, 0x6, 0x9, 0x4, 0x1, 0x4f9, 0x3ff, 0x2, 0x3, 0x7fff, 0x10001, 0x200, 0x1000, 0x4, 0x1ff, 0x4bfe8c14, 0xffffffff, 0x3, 0x3, 0x8ad2, 0x2, 0x4, 0x7, 0x40, 0x2, 0xdea, 0x82, 0x7ff, 0x101, 0x3, 0x3, 0xfffffffffffffffd, 0x4, 0xba5d, 0x7, 0xee, 0x1ff, 0x800, 0x8, 0x3f, 0x2, 0xffffffffffffce90, 0x1, 0x29, 0x7fffffff, 0x10000, 0x3, 0x416c, 0x2, 0x6, 0x3f, 0xc54, 0x9, 0x3, 0xfffffffffffffffb, 0x10001, 0x10001, 0x565, 0xfff, 0x9, 0x7, 0x7, 0x3, 0x2, 0x4, 0xd3, 0xffffffffffff0001, 0x80000001, 0x7ef, 0x9, 0x7fff, 0x3, 0x100000001], {r4, r5+10000000}}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) r7 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x753097f3228123a7, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r7, &(0x7f0000000480)="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"}, 0x20) dup3(r6, r3, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r8 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r8, 0x0, 0xedc0) write$FUSE_NOTIFY_INVAL_ENTRY(r8, &(0x7f00000002c0)=ANY=[@ANYBLOB="2b00000700010000000000000000000001000000000000000a0074385a1f2733e0e0ebfebd0000000000002f6465762f70093e8a8300d10de61143c022076275016ca0dcf35a0f1250edf43a00a1f9665677e4e29db0834911b07e428eacf0f5c0e4eb4ffdaefbd6f764f515069aa5682af0bb3e720f863a8a16d2aff4fcedc9d76db75a469ac174616e908f7247b0adcd74"], 0x2b) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x2) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r10, r9, 0x0) connect$inet6(r9, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r11 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r9, r11, 0x0, 0xedc0) ioctl$ION_IOC_HEAP_QUERY(r11, 0xc0184908, &(0x7f0000000280)={0x34, 0x0, &(0x7f0000000240)}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000200)={0x6, 0x3f, 0x4}) read(r2, 0x0, 0x600) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) 05:38:28 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x803, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000060039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 429.345235] SELinux: policydb string length 1207959560 does not match expected length 8 [ 429.379027] SELinux: failed to load policy 05:38:28 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 429.497729] protocol 88fb is buggy, dev hsr_slave_0 [ 429.502872] protocol 88fb is buggy, dev hsr_slave_1 05:38:29 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x804, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf90800004c5345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000070039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:29 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 429.730891] SELinux: policydb string length 1275068424 does not match expected length 8 [ 429.730951] serio: Serial port ptm1 [ 429.807710] protocol 88fb is buggy, dev hsr_slave_0 [ 429.812893] protocol 88fb is buggy, dev hsr_slave_1 05:38:29 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x805, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 429.851911] SELinux: failed to load policy 05:38:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/0ev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="20000f0039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:29 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r2, r1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r3, 0x0, 0xedc0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$overlay(0x400302, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='upperdir=./file1,|owerdir=./bus,Workdir=./file0,index=on,\x00']) 05:38:29 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xa], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:29 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x806, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000605345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000200039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2003280039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:29 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xb], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:29 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x807, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 430.345088] SELinux: policydb string length 1610612744 does not match expected length 8 [ 430.391894] SELinux: failed to load policy 05:38:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000000a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r2, r1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r3, 0x0, 0xedc0) ioctl$VIDIOC_G_CROP(r3, 0xc014563b, &(0x7f0000000000)={0xc, {0xadb, 0x8, 0x1, 0x7f}}) 05:38:29 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x808, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/Xev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000685345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="20003f0039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:30 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x80a, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:30 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xd], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 430.754745] SELinux: policydb string length 1744830472 does not match expected length 8 05:38:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000480039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:30 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x80b, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:30 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xe], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf90800006c5345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r1, r0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xedc0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000000)={0x7, 0x40, 0x2, 0x40, 0x9, 0xd9, 0x3}, 0xc) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000002740)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000000c0)=""/56) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x18) sendmmsg(r3, &(0x7f0000007e00), 0x136a88c8311572c, 0x11) 05:38:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="20004c0039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:30 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x11], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/cev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:30 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x80d, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 431.225050] SELinux: policydb string length 1811939336 does not match expected length 8 05:38:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000600039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 431.281522] sel_write_load: 1 callbacks suppressed [ 431.281529] SELinux: failed to load policy 05:38:30 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:30 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x80e, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000745345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:30 executing program 0: r0 = socket$inet6(0xa, 0xe, 0xffff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=0xffffffffffffffff, 0x4) r2 = fcntl$getown(r0, 0x9) r3 = getpgid(r2) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0xfffffffffffffffe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0xd0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x81, 0x101}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffa}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) r4 = socket$inet6(0xa, 0x7, 0x3) ioctl(r4, 0x5a, &(0x7f0000000280)="025cc80700145f8f764070") syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000300)='./file0/file0\x00', 0xe005, 0x1, &(0x7f0000000380)=[{&(0x7f00000006c0)="eb3c130105a4874e97bfeb58906d6b66732e6461740002", 0x1b, 0x2000000000}], 0x1010802, 0x0) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x147) mkdirat(0xffffffffffffffff, &(0x7f00000005c0)='./file0/file0\x00', 0x0) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f00000018c0)=ANY=[@ANYBLOB="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"/1734], @ANYRES64=r2]) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x3, 0xd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000000, 0x110, 0xffffffffffffffff, 0x8000000) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, &(0x7f0000001140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x9) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = open(0x0, 0x141042, 0x0) ftruncate(r7, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r7, 0x40505412, &(0x7f0000000780)={0x7, 0x1, 0x5, 0x0, 0x7}) capset(&(0x7f00000002c0)={0x19980330, r3}, &(0x7f0000000580)={0x4c, 0x2, 0x85, 0xffffffff, 0xca, 0xca2c}) r8 = perf_event_open(&(0x7f0000c86f88)={0x3, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfd, 0xfd, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff00000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x7, @perf_bp, 0x1e, 0x0, 0x0, 0x8}, 0x0, 0x0, r6, 0x8) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0)={0x8000, 0x1, 0x2080000000, 0xfffffffffefffc01, 0x9}, 0xc) openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0xa2081, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000540)='threaded\x00', 0x9) mkdirat(r5, &(0x7f00000004c0)='./file1\x00', 0x100000000) creat(&(0x7f0000000a00)='./file0/file0\x00', 0x44) fchdir(r8) fstatfs(r5, &(0x7f0000000400)=""/128) 05:38:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000680039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 431.604832] SELinux: policydb string length 1946157064 does not match expected length 8 05:38:31 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x28], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 431.653661] SELinux: failed to load policy 05:38:31 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x811, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="20006c0039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/iev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf90800007a5345204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:31 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x814, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:31 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x60], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000740039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 432.025930] SELinux: policydb string length 2046820360 does not match expected length 8 [ 432.049108] SELinux: failed to load policy 05:38:31 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r2, r1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r3, 0x0, 0xedc0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x14, r6, 0x200, 0x0, 0x0, {0x13, 0x0, 0x1a0ffffffff}}, 0x14}, 0x1, 0x0, 0x0, 0x4040}, 0x200084f5) sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x1040}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x44, r6, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x2c, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa235}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MON={0x4}]}, 0x44}}, 0x4000000) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2100}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x74, r6, 0x2, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xe5fb}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x8137b0d4f8141fd2}, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) r8 = dup2(r7, r0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) r11 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r11, r10, 0x0) dup2(r11, r8) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000000)={'\x00', 0x2012}) ioctl$TUNSETLINK(r9, 0x400454cd, 0x20) r12 = socket$nl_route(0x10, 0x3, 0x0) dup3(r12, r9, 0x0) 05:38:31 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x828, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005845204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:31 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x300, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="20007a0039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/lev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:31 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x860, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 432.429238] SELinux: policydb string XE Linux does not match my string SE Linux [ 432.468672] SELinux: failed to load policy 05:38:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000f00039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:32 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x500, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:32 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$TCFLSH(r2, 0x540a, 0x2) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x70, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000080)=ANY=[@ANYRES32=r6, @ANYBLOB="000000002a9abb2e47c1f9c66cfc91335e625123b07ef91618ba4453172cd057c13f58f0b34c062d56c110c209c6757b30b815c0cd47a1bb4f7bac65f1d7642104eb821eac14e3f67ef515f131cfe94aa10e75f0fd13f9d518e643b4852e6808c5898eefd90e430baac7990c3f8637b23f6b337ae0e2bd47caa54ab0272d3bf0d2c4890dfe5dac8808dd2e8d1cb14bd5473fdb8c5eea172f1f3f3492d30a9240e64b016196832a352db7717905decd850aead16d382d9beb9b271bf1062b572730a1939497f7ffbed39c4c391e565c271068672b8e20004aaa93ab5a08c00d93ebee4274"], 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) ioctl$TIOCPKT(r7, 0x5420, &(0x7f00000002c0)=0x400000005) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) ioctl$TIOCPKT(r2, 0x5420, &(0x7f00000002c0)=0x400000005) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) dup3(r8, r9, 0x0) r10 = syz_open_pts(r8, 0x0) r11 = dup3(r10, r8, 0x0) ioctl$TCFLSH(r11, 0x540a, 0x2) ioctl$IOC_PR_REGISTER(r11, 0x401870c8, &(0x7f0000000240)={0x0, 0x48738d86, 0x1}) dup3(r7, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r7, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000140)={r6, 0xffff, 0xd5, 0x5, 0x3f, 0x1, 0x0, 0x3ff, {r12, @in={{0x2, 0x4e20, @local}}, 0x3ff, 0x1, 0x0, 0x8, 0xfff}}, &(0x7f0000000200)=0xb0) 05:38:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000000a45204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:32 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x900, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000003f002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:32 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x600, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 432.775445] SELinux: policydb string [ 432.775445] E Linux does not match my string SE Linux [ 432.860045] SELinux: failed to load policy 05:38:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000052002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/oev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:32 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x700, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:32 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0xa00, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000002545204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:32 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0xb00, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:32 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x802, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 433.221976] SELinux: policydb string %E Linux does not match my string SE Linux [ 433.247849] net_ratelimit: 14 callbacks suppressed [ 433.247857] protocol 88fb is buggy, dev hsr_slave_0 [ 433.258011] protocol 88fb is buggy, dev hsr_slave_1 [ 433.289585] SELinux: failed to load policy 05:38:33 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x1c00, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:33 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x80000042801, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000240)) write$vnet(r0, &(0x7f0000000140)={0x1, {0x0, 0x0, 0x0}}, 0x68) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x4}, 0x10) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) close(r0) 05:38:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000020039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005845204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:33 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x803, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/pev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) [ 433.640851] SELinux: policydb string XE Linux does not match my string SE Linux [ 433.657721] protocol 88fb is buggy, dev hsr_slave_0 [ 433.662871] protocol 88fb is buggy, dev hsr_slave_1 05:38:33 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x804, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000030039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 433.697189] SELinux: failed to load policy 05:38:33 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x4305, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf908000000530a204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000040039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:33 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x805, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:33 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x6000, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 433.967712] protocol 88fb is buggy, dev hsr_slave_0 [ 433.972884] protocol 88fb is buggy, dev hsr_slave_1 [ 434.031717] SELinux: policydb string S [ 434.031717] Linux does not match my string SE Linux [ 434.066708] SELinux: failed to load policy [ 434.367829] protocol 88fb is buggy, dev hsr_slave_0 [ 434.373014] protocol 88fb is buggy, dev hsr_slave_1 05:38:33 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$inet6(0xa, 0x400000000001, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='f\x00\x00\x00\xf3\xff\xff\xff\xff\xff\xff\xff', 0x5114f7941f3d736c, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000080)={0x0, 0x1, 0x8001, 0x7, 0x6}) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000000c0)={'bond0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bond0\x00\x05H\xfeL \x00\x00\nz\x03', 0xffb}) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000000)={r6}, 0x14) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0xff45, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r11, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="34000000240007017000"/20, @ANYRES32=r11, @ANYBLOB="00000000000000a3a6e30400000002b86e280d2f0951b9f0022589dab0e27a460173a87bc04566843d8256502c4775af651772474102620e56eceda71e60d3767acb5c1e174e985b885d5fac206175689eb3f295121d555778e2adfbd64e0660000000007718a76f"], 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'bond_slave_1\x00', r11}) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000240)={'team0\x00', r11}) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000000)={r6}, &(0x7f0000000080)=0x8) r12 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r12, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_mreq(r2, 0x29, 0xe, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[], 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 05:38:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/sev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000050039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:33 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x806, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:33 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x6558, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005325204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 434.457780] protocol 88fb is buggy, dev hsr_slave_0 [ 434.463014] protocol 88fb is buggy, dev hsr_slave_1 05:38:34 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x8035, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:34 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000060039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:34 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x807, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 434.564556] SELinux: policydb string S% Linux does not match my string SE Linux [ 434.596362] SELinux: failed to load policy 05:38:34 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x808, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005358204c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:34 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x8100, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 435.549157] device bond0 entered promiscuous mode [ 435.554064] device bond_slave_0 entered promiscuous mode [ 435.596120] device bond_slave_1 entered promiscuous mode [ 435.659339] 8021q: adding VLAN 0 to HW filter on device bond0 [ 435.675090] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 435.696820] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 05:38:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000000)={0x0, 0x8000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x92, 0xfffffffffffffffe}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000200)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01dfdde80f32d9e90f086665676426f7c5000000000f2245deef0b23f5", 0x23}], 0x1, 0x0, 0x0, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='\x95\xf1\xab\xf7\xff\x0e\xff\xe4\x00\x92\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000c000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, &(0x7f0000000140)="b9000400000f326663430066eddc0f0f01c442c20100b905040000cf430f01c2c482198e5200c4e16d75572ab9800000c00f3235001000000f30", 0x3a}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000002000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, 0x0, 0xfffffffffffffff2}], 0x0, 0x0, 0x0, 0x208) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:38:35 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x80a, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000070039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/uev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:35 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x8847, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345024c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="20000f0039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:35 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x80b, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 435.840067] SELinux: policydb string SELinux does not match my string SE Linux 05:38:35 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x8848, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 435.903891] SELinux: failed to load policy 05:38:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000480039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345034c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:35 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:35 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x80d, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/xev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="20004c0039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket(0x10, 0x803, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000300)=0x1, 0x675) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$PPPIOCCONNECT(0xffffffffffffffff, 0x4004743a, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r3, r2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r2, r4, 0x0, 0xedc0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x17}, 0x2}, @in6={0xa, 0x4e22, 0x1, @mcast1, 0x2}, @in6={0xa, 0x4e20, 0x95, @local, 0x7be0}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x15}}, @in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e23, @empty}], 0xa4) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x9, &(0x7f00000000c0)=0x3, 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r1, r5, 0x0, 0x80000003) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000880)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000007000000040000008004000058020000580200000000000098030000980300009803000004000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000db880000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb000000000000000000000000000000000000000000000000000000000006ac1414bb0400000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0001801000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000000000020000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c650000000000000000000000000000000000000000000000000180c200000f0000000000000000000000000000000000000000000000000000ac1414bb00004f9008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000a998d61a4b4f5b43f1bd6c3652055cbdb2207be7f8762cb99dc4a7fb2051f6979db41edc20f49a7dc1daef0c01aab99d74f97137b423d0"], 0x4d0) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff02, 0x420ffe0, 0x0, 0xfffffffffffffd37) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) chown(0x0, 0x0, 0x0) getpgrp(0x0) socket$vsock_stream(0x28, 0x1, 0x0) getresgid(0x0, 0x0, 0x0) r6 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000340)=ANY=[@ANYBLOB="c5f3ffffffffffffcdc4e2ca41bce16eb9d1697f3c435ee960737c58def135f74d71a8c5769886b5dd029a4aae0ce3b23a670e5c89907ad5b7184e218c0c24775d88920221d7a07d5e81a8925a01d6fe072319cd320cefac981177a3c19456b23f1d6b74", @ANYRES32=0x0], &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r7, &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f00000001c0)={r7, 0x4}, &(0x7f0000000100)=0xffa1) getsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r8, 0x3ff}, &(0x7f0000000180)=0x8) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) [ 436.289220] SELinux: policydb string SELinux does not match my string SE Linux [ 436.316279] SELinux: failed to load policy 05:38:35 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x8906, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345044c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:35 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x80e, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 436.560233] SELinux: policydb string SELinux does not match my string SE Linux [ 436.613720] SELinux: failed to load policy 05:38:36 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x2, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000600039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345054c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:36 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x811, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000680039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/\xc8ev/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:36 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x3, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 437.062481] SELinux: policydb string SELinux does not match my string SE Linux [ 437.145181] SELinux: failed to load policy 05:38:36 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x814, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:36 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 05:38:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="20006c0039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:36 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x4, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345064c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:37 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x828, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 437.573115] SELinux: policydb string SELinux does not match my string SE Linux 05:38:37 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="44e3eb"], 0x1}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000000b00000040000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0) 05:38:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000740039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:37 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 437.657439] SELinux: failed to load policy 05:38:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/d\nv/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:37 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x860, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345074c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:37 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="20007a0039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:37 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x900, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f00000bd000), 0xf6, 0x0) r4 = memfd_create(&(0x7f00000000c0)='\x06\x00\x00\x00^\x00\xac\xd8\xfd\xcc\xeeq\xe5\xf5\xcb\x801`\xe48\x85\xa4\xf5\xd0\x1b\\\x04\f\xf8F\\\xb4\xba\x8d\xef\x12d\xee\xa5?\x00kZ\x8b\x19h\xd7|\x14i\r\x18U9\xc1\xd7\x10\xf0G\x12\xa8\xbaa\xb2\x94|%n\x1e+\x9f\xbb\xb8\xac\x81\x8d\x93q\xd4\xd4z\xaaZ\x0f\xaa\xc7\x97#\xe5g l\xd55\x15\xbf\xfc\xf5\x83\xb72\x00Y\x15\x92\xb1\xb6a\xf4\xe9u\xb2\xe7\xeciy\b\xdb\xc7\xf1\x87\xc9\a\x91\x04J\xc8\x0e\xff|J\'Nxr\x00\xbc\xab5\x9b\x85>\x99\xcaz2\xabKI\xdc\xe4\x9f\xa5\xd0\x0ewm\xe7\xccK\xc9\x8b\x8bE\x89\x03\x00\x00\x00}@Ry\xa69^\xdc\x9d\xa0\x04\xdf \aelO7\xf1\xda\xcc\xa2x\xc2\x9a\xf5\x18F\xa0\x80M\xf9,+\xc9\xf7/nt\x9ba\x14\x1b\x18\xdd\x18X\xd2o\x15\x97L\xe6\xb5\xba\xc7\xf2W\n\x7f\x14ZIL:T\x1bd\x19\x8dE\x9c\xb1\xb9JK\x1do\x85\xe9\xa2\xca\x9cd\b\xc8\xbdiQ_L\xb0\xb9 \xf7/F\xfc\'M#,\x84M\xba\xa9\xa2yr\'?f\tb\xdai\xfd\x8c\x9aoj\x84\x03i\x8a|\xf7T;=p\xa2\x98f\xc7\xefu=\x96\xcb\x11\x91\xce\xce\xbev\xaa\xbb\xca\xfa\xa3\xde\xd5\x1f\xd7\x03:12\xf2\xfd\rN\x84=A\xae\x9b3\x81\xa9~\xb7\x80\xd1\xe2\xf6\xf2\xb8\xc9\x8a\xabC\xe2\xec\xb8,j\xe1\xbb\x1b\x1f@', 0x3) write$binfmt_misc(r4, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r3, r4, &(0x7f0000000040), 0xffdb) sendfile(r3, r4, &(0x7f0000000080), 0x9) fcntl$addseals(r4, 0x409, 0x8) [ 438.044064] SELinux: policydb string SELinux does not match my string SE Linux [ 438.072922] SELinux: failed to load policy 05:38:37 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000f00039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345084c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/d%v/nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000339002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:37 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x2, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:37 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0xa00, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 438.405072] SELinux: policydb string SELinux does not match my string SE Linux [ 438.449435] SELinux: failed to load policy [ 438.471737] [ 438.473866] ============================= [ 438.478024] WARNING: suspicious RCU usage [ 438.482187] 4.19.84 #0 Not tainted [ 438.485734] ----------------------------- [ 438.489892] include/linux/radix-tree.h:241 suspicious rcu_dereference_check() usage! [ 438.497778] [ 438.497778] other info that might help us debug this: [ 438.497778] [ 438.505945] [ 438.505945] rcu_scheduler_active = 2, debug_locks = 1 [ 438.512629] 2 locks held by syz-executor.0/27929: [ 438.517471] #0: 00000000e4a10091 (&sb->s_type->i_mutex_key#12){+.+.}, at: memfd_fcntl+0x235/0x1750 [ 438.526799] #1: 00000000995c4221 (&(&(&mapping->i_pages)->xa_lock)->rlock){-.-.}, at: memfd_fcntl+0x4bc/0x1750 [ 438.537077] [ 438.537077] stack backtrace: [ 438.541941] CPU: 0 PID: 27929 Comm: syz-executor.0 Not tainted 4.19.84 #0 [ 438.548870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.558228] Call Trace: [ 438.560836] dump_stack+0x197/0x210 [ 438.564491] lockdep_rcu_suspicious+0x153/0x15d [ 438.569270] memfd_fcntl+0xfdf/0x1750 [ 438.573088] ? __fget+0x340/0x540 [ 438.576565] ? find_held_lock+0x35/0x130 [ 438.580630] ? __fget+0x340/0x540 [ 438.584095] ? memfd_file_seals_ptr+0x160/0x160 [ 438.588797] ? lock_downgrade+0x880/0x880 [ 438.592940] ? kasan_check_read+0x11/0x20 [ 438.597080] do_fcntl+0x200/0x1020 [ 438.600610] ? f_getown+0xc0/0xc0 [ 438.604051] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 438.609231] ? selinux_file_fcntl+0x74/0x140 [ 438.613627] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.619153] ? security_file_fcntl+0x8d/0xc0 [ 438.623551] __x64_sys_fcntl+0x16d/0x1e0 [ 438.627615] do_syscall_64+0xfd/0x620 [ 438.631413] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.636630] RIP: 0033:0x45a639 [ 438.639854] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 438.658937] RSP: 002b:00007fe72a694c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 05:38:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345094c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) [ 438.666673] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 [ 438.673941] RDX: 0000000000000008 RSI: 0000000000000409 RDI: 0000000000000008 [ 438.681200] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 438.688495] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe72a6956d4 [ 438.695750] R13: 00000000004c1068 R14: 00000000004d3c60 R15: 00000000ffffffff [ 438.703514] net_ratelimit: 16 callbacks suppressed [ 438.703521] protocol 88fb is buggy, dev hsr_slave_0 [ 438.707810] protocol 88fb is buggy, dev hsr_slave_0 05:38:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000280339002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 438.708737] protocol 88fb is buggy, dev hsr_slave_1 [ 438.713522] protocol 88fb is buggy, dev hsr_slave_1 05:38:38 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x3, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:38 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0xb00, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 438.848472] SELinux: policydb string SE Linux does not match my string SE Linux [ 438.888775] SELinux: failed to load policy 05:38:38 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003640)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @mcast2}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000240)="30d0960bfaa28075173ea4a0ae4bf1a0adc7de7bae823c7911857c9bf29c3b8d2dee78d79cc30a9d1cc24679a157e4f6ef29962c458159e547386c742cd948ced072b63a7eef69a99d1bb74b4974529de0578747964d0be6dbca2cd312cc0ce347a52068a14fc99435a1b7d0ea78f8984dd22d907d57ed1f917b35079518a7fd81", 0x81}, {&(0x7f0000000000)="4fa66258bf9a2cf4bbc0dc3a9d2f826e193da4e6fbf170136cd5887d13bda45196a58eb088ebe23df4cd7cd99cbbc388456b3a4b22805e8389996a686521c895f78ce684a57a1ad8aa2fcde998a834d642b41529c7bb23a8dc71b28ccdde06e102543ed894d8594620d0604574c71b885ae8575cc2a91dafce35f8effea3dc9a84", 0x81}, {&(0x7f00000003c0)="68830e165cc631dc03cef1388d5f33dcedbc31f6e07fa51655a9452f9244018e76a4c99510369a8f3af63a372191a128551cde2ebaa6924187106e2f7a444e544960298cca593e90710a1dcaf24356704443bde07e04d6b5c6fde4079c28016c3c18e705b8a78015bb696393d4bba0cf4a3429a6875580f956a688fd", 0x7c}, {&(0x7f0000000440)="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", 0x1ff}], 0x4, &(0x7f0000000640)=[@rthdrdstopts={{0x60, 0x29, 0x37, {0x0, 0x200000000000017d, [], [@generic={0x0, 0x16, "abc35b5b085fed1f4ba28bbc3a6b4d1be8847aa61d97"}, @enc_lim, @hao={0xc9, 0x10, @local}, @hao={0xc9, 0x10, @rand_addr="3c240578138d7239d405bc028e83ce0b"}, @padn, @padn, @pad1]}}}, @rthdrdstopts={{0x18}}, @hopopts_2292={{0x1e8, 0x29, 0x36, {0x0, 0x3a, [], [@calipso={0x7, 0x0, {0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0]}}, @generic={0x0, 0xd2, "6f028bc85b31458f9bc4fc734ffd4c9107687bd7e88a884e9d8daf3cb08dda467af48136710579689ddd6c5caffea8a4cb16ea74a06c8b7a43853bc22f6e8583fe09945ad79f7ea2d5fc428fb254110f9d9247988e0eea321ba29c817a4677a50cdf05ae45a33639a248986424427b17b6990eb06d67604664b6abd0a83b6d6b4ef53b73473c1217292522968e633456d4962cda0205ea3a101df29e9b9025ab00548075ccf8af0ab8da784c6198de21452921a4afd0a274260d47847b658a9aaaa0f6ac1302143243c50359d7fc972fcdbe"}, @enc_lim, @pad1, @ra, @jumbo, @hao={0xc9, 0x10, @dev}, @generic={0x0, 0xd6, "da324185470ebaff14d42dde2ad68bd72b67c9bd64da714ad5dbbd9e73eaa868e3522f49a4d1268c67350487be0d1370d869bd5a3ed4ae3569ee266c0a17222f90b51a6de19e8bbd677c3ad064efac3afe3dc73716785dd1733eadcf51b0e11a0a75387dd0e81f09dd0e81e2e71a2374998eb1a5463a3d9c0912d4974a98634b1f6d0e805295ef5ac4bcdec8a2219bb9498b1b34fef8c5ea9e3791df5d4bd39412cab3e1206f77517ee4c147b070396507d9b843eadac89f76a3cb9664ae412768a8c712c7c9b88cb429b4c18e2403236dc064bc4e15"}]}}}], 0x260}}], 0x1, 0x0) 05:38:38 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x5, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000539002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev5nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf90800000053450a4c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:38 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x1c00, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 439.165636] SELinux: policydb string SE [ 439.165636] Linux does not match my string SE Linux 05:38:38 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x4305, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 439.212096] SELinux: failed to load policy 05:38:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000639002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:38 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$bt_hci(r0, 0x0, 0x1, &(0x7f0000000000)=""/1, &(0x7f0000000040)=0x1) 05:38:38 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf90800000053450b4c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:38 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x6000, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:38 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r1, 0x800002, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00'], 0x1) fallocate(r1, 0x3, 0x0, 0x8020003) 05:38:38 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x8, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 439.485533] SELinux: policydb string SE Linux does not match my string SE Linux [ 439.487727] protocol 88fb is buggy, dev hsr_slave_0 [ 439.498274] protocol 88fb is buggy, dev hsr_slave_1 05:38:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000739002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 439.532629] SELinux: failed to load policy 05:38:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev=nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:39 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0xa, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf90800000053450c4c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:39 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xa1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0xb) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 05:38:39 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x6558, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000f39002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:39 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 439.877040] SELinux: policydb string SE Linux does not match my string SE Linux [ 439.887817] protocol 88fb is buggy, dev hsr_slave_0 [ 439.892925] protocol 88fb is buggy, dev hsr_slave_1 [ 439.918706] SELinux: failed to load policy 05:38:39 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x8035, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000002039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:39 executing program 0: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x950, 0x882) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000240)='\'', 0xfcc9}], 0x1, 0x81805) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="500000001200000028bd70000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000100000200019000008201cbf4891a609a1a4bb843a3e080006ea00000000140019dbe942a5b467ce0400648a1c166321b102c1e9f7badcaf9f5a61af2945c8560c508dae77760abc0800"], 0x50}}, 0x20040010) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'ipddp0\x00', 0x4}, 0x18) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2) socket$inet6_udp(0xa, 0x2, 0x0) sendfile(r0, r1, 0x0, 0x20002000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000001c0)={0x0, 0x0, 0x2}) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) unlinkat(r5, &(0x7f0000000280)='./file0\x00', 0x200) ioctl$DRM_IOCTL_GEM_OPEN(r5, 0xc010640b, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000280)={r4, r6}) 05:38:39 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf90800000053450d4c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/\nbd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000032839002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:39 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x8100, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 440.207708] protocol 88fb is buggy, dev hsr_slave_0 [ 440.212983] protocol 88fb is buggy, dev hsr_slave_1 05:38:39 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x3, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 440.287193] SELinux: policydb string SE Linux does not match my string SE Linux 05:38:39 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf90800000053450e4c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000003f39002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:40 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x8847, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:40 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f00000001c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='veth1_to_bridge\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffce9, 0x0, 0x0, 0x0) [ 440.617354] SELinux: policydb string SELinux does not match my string SE Linux 05:38:40 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000004839002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x800000003, 0xff) syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='k\x00\x04\xc7\x00') connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000000000000efec7eb08a19e46f00000008", @ANYRES32=0x0, @ANYBLOB="0000040000000000"], 0x3}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:38:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/%bd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:40 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x8848, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf90800000053450f4c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:40 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000004c39002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:40 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 441.022116] SELinux: policydb string SELinux does not match my string SE Linux 05:38:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000006039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) [ 441.118177] audit: type=1800 audit(1574141920.593:4538): pid=28839 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16977 res=0 05:38:40 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x4, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345104c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:40 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x18}], 0x1000014, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0) syz_genetlink_get_family_id$devlink(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000600)="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", 0x200) syz_open_procfs(0x0, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 05:38:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000006839002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:40 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x8906, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 441.390825] SELinux: policydb string SELinux does not match my string SE Linux [ 441.467154] sel_write_load: 3 callbacks suppressed [ 441.467160] SELinux: failed to load policy 05:38:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/.bd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:41 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x5, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:41 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000006c39002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:41 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x2, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345114c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:41 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000007439002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:41 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x3, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:41 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x6, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:41 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x4, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) fcntl$getflags(r0, 0x408) 05:38:41 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000007a39002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:41 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x7, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:41 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev//bd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345124c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:41 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:41 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x11) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) r1 = getpid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x141042, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) pipe(0x0) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getgid() fchown(r2, 0x0, r3) getgroups(0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x33c) getresuid(&(0x7f0000000100), &(0x7f0000000200)=0x0, &(0x7f0000000240)) fsetxattr$security_capability(r6, 0x0, &(0x7f0000000300)=@v3={0x3000000, [{0x4}, {0x8, 0x9}], r7}, 0x18, 0x3) chown(&(0x7f0000000180)='./file0\x00', r7, r3) ioctl$EVIOCGMASK(r5, 0x80104592, &(0x7f0000000140)={0x0, 0x1000, &(0x7f0000000540)="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"}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000380)) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) getdents(0xffffffffffffffff, 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 442.346778] SELinux: policydb string SELinux does not match my string SE Linux [ 442.372581] SELinux: failed to load policy 05:38:41 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:41 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000f039002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:42 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xa, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000000f002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:42 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:42 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xb, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/n\nd', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='f2fs\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) set_tid_address(&(0x7f0000000300)) 05:38:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000239002d080000000000000000010000000c000200080000009ef85e4e80be2a780fc454f275a1965e1bb193104402486f3bb51f3eaf6abbe87ac610e39d9f4814ecaaf5270327e35c87af7f8f186e6bd61b751d84182d223c53a583fe4304e0001808c171f97144b8a065d623c32c496a9b33624c6f9cf6c39128af8b0d766c14fd41b8364f9dfbe7d5f6c226c8", @ANYRES32], 0x20}}, 0x0) 05:38:42 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x2, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 05:38:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345134c696e75781500280001000800faff0600000040000080000000000000000000960300000067a7000000200000cd4573cb91228bfbbb2aff12e31c3ece4be55945da1a553b9f81e2218c6c037f57c2eea677bbae02dcd9433a7dcab864332277004570e072c1a1e8870eb277b1c86d0000"], 0x4b) 05:38:42 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xd, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) [ 444.047872] net_ratelimit: 16 callbacks suppressed [ 444.047882] protocol 88fb is buggy, dev hsr_slave_0 [ 444.058023] protocol 88fb is buggy, dev hsr_slave_1 [ 444.367736] protocol 88fb is buggy, dev hsr_slave_0 [ 444.372891] protocol 88fb is buggy, dev hsr_slave_1 [ 444.927721] protocol 88fb is buggy, dev hsr_slave_0 [ 444.927790] protocol 88fb is buggy, dev hsr_slave_0 [ 444.932827] protocol 88fb is buggy, dev hsr_slave_1 [ 444.937881] protocol 88fb is buggy, dev hsr_slave_1 [ 445.391112] IPVS: ftp: loaded support on port[0] = 21 [ 445.541477] bridge0: port 3(gretap0) entered disabled state [ 445.549393] device gretap0 left promiscuous mode [ 445.554265] bridge0: port 3(gretap0) entered disabled state [ 445.727737] protocol 88fb is buggy, dev hsr_slave_0 [ 445.733029] protocol 88fb is buggy, dev hsr_slave_1 [ 445.826743] chnl_net:caif_netlink_parms(): no params data found [ 445.863037] bridge0: port 1(bridge_slave_0) entered blocking state [ 445.869877] bridge0: port 1(bridge_slave_0) entered disabled state [ 445.877288] device bridge_slave_0 entered promiscuous mode [ 445.885478] bridge0: port 2(bridge_slave_1) entered blocking state [ 445.892985] bridge0: port 2(bridge_slave_1) entered disabled state [ 445.900352] device bridge_slave_1 entered promiscuous mode [ 446.055687] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 446.065479] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 446.084517] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 446.092294] team0: Port device team_slave_0 added [ 446.098383] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 446.105628] team0: Port device team_slave_1 added [ 446.111246] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 446.119115] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 446.171588] device hsr_slave_0 entered promiscuous mode [ 446.208051] device hsr_slave_1 entered promiscuous mode [ 446.248745] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 446.311432] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 446.328037] bridge0: port 2(bridge_slave_1) entered blocking state [ 446.334430] bridge0: port 2(bridge_slave_1) entered forwarding state [ 446.341146] bridge0: port 1(bridge_slave_0) entered blocking state [ 446.347541] bridge0: port 1(bridge_slave_0) entered forwarding state [ 446.401372] device bridge_slave_1 left promiscuous mode [ 446.406890] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.459076] device bridge_slave_0 left promiscuous mode [ 446.464553] bridge0: port 1(bridge_slave_0) entered disabled state