Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 40.552512] audit: type=1800 audit(1571313284.629:33): pid=7528 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 44.943938] kauditd_printk_skb: 1 callbacks suppressed [ 44.943952] audit: type=1400 audit(1571313289.019:35): avc: denied { map } for pid=7704 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.1.34' (ECDSA) to the list of known hosts. 2019/10/17 11:54:55 fuzzer started [ 51.498464] audit: type=1400 audit(1571313295.569:36): avc: denied { map } for pid=7713 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/10/17 11:54:56 dialing manager at 10.128.0.105:34769 2019/10/17 11:54:57 syscalls: 2516 2019/10/17 11:54:57 code coverage: enabled 2019/10/17 11:54:57 comparison tracing: enabled 2019/10/17 11:54:57 extra coverage: extra coverage is not supported by the kernel 2019/10/17 11:54:57 setuid sandbox: enabled 2019/10/17 11:54:57 namespace sandbox: enabled 2019/10/17 11:54:57 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/17 11:54:57 fault injection: enabled 2019/10/17 11:54:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/17 11:54:57 net packet injection: enabled 2019/10/17 11:54:57 net device setup: enabled 2019/10/17 11:54:57 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 11:56:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x18, 0x33, 0x119, 0x0, 0x0, {}, [@generic="ff"]}, 0x18}}, 0x0) [ 162.366246] audit: type=1400 audit(1571313406.439:37): avc: denied { map } for pid=7731 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=111 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 162.455429] IPVS: ftp: loaded support on port[0] = 21 11:56:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_names\x00') mq_timedreceive(r0, 0x0, 0x0, 0x0, 0x0) [ 162.564243] chnl_net:caif_netlink_parms(): no params data found [ 162.625340] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.633390] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.641638] device bridge_slave_0 entered promiscuous mode [ 162.651446] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.658636] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.666600] device bridge_slave_1 entered promiscuous mode [ 162.691653] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 162.711096] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 162.752093] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 162.760625] team0: Port device team_slave_0 added [ 162.766408] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 162.774390] team0: Port device team_slave_1 added [ 162.786762] IPVS: ftp: loaded support on port[0] = 21 [ 162.793063] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready 11:56:46 executing program 2: unshare(0x400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='V', 0x1, 0x200400c4, 0x0, 0x0) [ 162.804930] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 162.892689] device hsr_slave_0 entered promiscuous mode [ 162.929923] device hsr_slave_1 entered promiscuous mode [ 162.970245] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 162.977515] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 162.995211] IPVS: ftp: loaded support on port[0] = 21 11:56:47 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) [ 163.038034] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.044780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.051880] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.058935] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.220865] chnl_net:caif_netlink_parms(): no params data found [ 163.288740] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.296940] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.305613] device bridge_slave_0 entered promiscuous mode 11:56:47 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000480)={'ah\x00'}, &(0x7f0000000500)=0x1e) [ 163.341864] IPVS: ftp: loaded support on port[0] = 21 [ 163.348682] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 163.356997] 8021q: adding VLAN 0 to HW filter on device bond0 [ 163.365825] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.373775] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.382859] device bridge_slave_1 entered promiscuous mode [ 163.399507] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 163.429823] chnl_net:caif_netlink_parms(): no params data found [ 163.447288] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 163.470810] 8021q: adding VLAN 0 to HW filter on device team0 [ 163.500296] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 163.508076] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.518717] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.538048] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.547068] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 163.573366] IPVS: ftp: loaded support on port[0] = 21 [ 163.580461] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 163.614479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.622979] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.629376] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.640307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.648170] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.654625] bridge0: port 2(bridge_slave_1) entered forwarding state 11:56:47 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast1=0xe0000306, @local, @multicast1}, 0xc) [ 163.695695] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 163.745801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 163.758857] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 163.771785] team0: Port device team_slave_0 added [ 163.783954] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.792902] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.803701] device bridge_slave_0 entered promiscuous mode [ 163.812985] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.819366] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.827671] device bridge_slave_1 entered promiscuous mode [ 163.838498] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 163.849248] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 163.859755] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 163.867321] team0: Port device team_slave_1 added [ 163.875005] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 163.884545] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 163.897641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 163.905861] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 163.913764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 163.922160] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 163.930585] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 163.939246] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 163.954198] IPVS: ftp: loaded support on port[0] = 21 [ 163.954594] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 163.981910] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 163.991654] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 164.005857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 164.013805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.022294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 164.031411] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.063678] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 164.072129] team0: Port device team_slave_0 added [ 164.083072] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 164.090901] team0: Port device team_slave_1 added [ 164.096834] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 164.106777] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 164.171455] device hsr_slave_0 entered promiscuous mode [ 164.210276] device hsr_slave_1 entered promiscuous mode [ 164.262129] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 164.269710] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 164.296417] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 164.311526] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 164.327143] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 164.374212] chnl_net:caif_netlink_parms(): no params data found [ 164.408776] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 164.419059] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 164.473587] device hsr_slave_0 entered promiscuous mode [ 164.520103] device hsr_slave_1 entered promiscuous mode [ 164.588196] audit: type=1400 audit(1571313408.659:38): avc: denied { associate } for pid=7732 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 164.629221] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 164.636932] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 164.664705] chnl_net:caif_netlink_parms(): no params data found [ 164.683348] audit: type=1400 audit(1571313408.759:39): avc: denied { create } for pid=7752 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 164.735230] 8021q: adding VLAN 0 to HW filter on device bond0 [ 164.741530] audit: type=1400 audit(1571313408.809:40): avc: denied { write } for pid=7752 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 11:56:48 executing program 0: io_setup(0x3, &(0x7f00000000c0)) [ 164.821494] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 164.829662] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.836047] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.846628] device bridge_slave_0 entered promiscuous mode [ 164.881570] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 164.893244] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 164.904291] chnl_net:caif_netlink_parms(): no params data found [ 164.913889] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.921152] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.928162] device bridge_slave_1 entered promiscuous mode [ 164.946678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.954571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.972529] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready 11:56:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'eql\x00', 0x10000803}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r0) [ 164.978640] 8021q: adding VLAN 0 to HW filter on device team0 [ 165.030635] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 165.047349] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 165.068440] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 165.077658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.086499] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.095981] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.102428] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.109432] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.116306] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.124458] device bridge_slave_0 entered promiscuous mode [ 165.134077] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 165.167390] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.176316] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.184106] device bridge_slave_0 entered promiscuous mode [ 165.191322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.198520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.207128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.215109] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.221507] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.238837] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.245323] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.252775] device bridge_slave_1 entered promiscuous mode [ 165.274409] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 165.287075] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.293948] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.302264] device bridge_slave_1 entered promiscuous mode [ 165.319199] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 165.327227] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 165.335796] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 165.344581] team0: Port device team_slave_0 added [ 165.351369] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 165.359854] team0: Port device team_slave_1 added [ 165.367734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 165.392501] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 165.403351] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 165.427060] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 165.443381] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 165.503089] device hsr_slave_0 entered promiscuous mode [ 165.549979] device hsr_slave_1 entered promiscuous mode [ 165.590504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 165.601386] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 165.609942] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 165.618248] team0: Port device team_slave_0 added [ 165.624409] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 165.632137] team0: Port device team_slave_1 added 11:56:49 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}}, 0x0) [ 165.638564] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 165.660555] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 165.668633] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 165.679115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.696345] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.705347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.713809] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.727096] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 165.735123] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 165.745647] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 165.754188] team0: Port device team_slave_0 added [ 165.760318] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 165.768678] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 165.768989] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 165.776993] team0: Port device team_slave_1 added [ 165.805229] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 165.861843] device hsr_slave_0 entered promiscuous mode [ 165.899960] device hsr_slave_1 entered promiscuous mode [ 165.940247] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 165.948801] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 165.963078] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 165.973630] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 165.982627] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 11:56:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) [ 165.983134] syz-executor.0 (7768) used greatest stack depth: 23072 bytes left [ 165.998512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.016955] EXT4-fs (loop0): Ignoring removed oldalloc option [ 166.017427] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.023895] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 166.043665] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.045848] EXT4-fs (loop0): Unsupported filesystem blocksize 0 (1923657432 log_block_size) [ 166.053031] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 166.073962] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 166.084908] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 166.092625] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.106752] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 166.125546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.133635] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 11:56:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) [ 166.143543] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 166.167809] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 166.216280] device hsr_slave_0 entered promiscuous mode [ 166.251930] EXT4-fs (loop0): Ignoring removed oldalloc option [ 166.258307] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 166.270116] device hsr_slave_1 entered promiscuous mode [ 166.278413] EXT4-fs (loop0): Unsupported filesystem blocksize 0 (1923657432 log_block_size) [ 166.320622] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 166.327986] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 166.355342] 8021q: adding VLAN 0 to HW filter on device batadv0 11:56:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) [ 166.369306] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 166.408758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.416330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.426609] EXT4-fs (loop0): Ignoring removed oldalloc option [ 166.432073] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 166.433584] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 166.444702] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.453043] EXT4-fs (loop0): Unsupported filesystem blocksize 0 (1923657432 log_block_size) [ 166.466466] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 166.486572] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 166.496119] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 11:56:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) [ 166.549981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.558098] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 11:56:50 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) pipe(&(0x7f00000000c0)) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0xffffff42) write(r1, &(0x7f0000000440)="b9", 0xfe6e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20310, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 166.590186] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.596845] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.608255] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 166.626258] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.636303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.644821] EXT4-fs (loop0): Ignoring removed oldalloc option [ 166.654845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.676315] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 166.680630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.697084] EXT4-fs (loop0): Unsupported filesystem blocksize 0 (1923657432 log_block_size) [ 166.723722] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.730187] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.745281] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 166.758113] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 166.792820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.847592] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 166.864256] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 166.881078] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 166.888176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.899481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.908879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.917918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.926193] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.936255] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.946230] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 166.952616] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.961892] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 166.973086] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.983308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.993020] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.011258] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 167.022473] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 167.033432] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 167.041714] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 167.049139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.057699] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.066170] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.072649] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.079992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.087945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.095329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.104028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.111939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.123449] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 167.134934] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 167.143009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.151591] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.161773] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.168971] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.176622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.186055] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 167.194618] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 167.201028] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.216998] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.225856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.233975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.246039] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 167.253035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 167.265018] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 167.276167] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 167.286095] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 167.297417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.305452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.313587] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.320004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.328879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.337481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.347374] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.356558] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.363985] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.372698] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 167.382139] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 167.394977] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 167.402781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.411351] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.419188] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.430892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.438585] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.445272] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.455420] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 167.466532] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 167.473384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.481063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.491003] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 167.498830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.511651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.522428] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 167.528627] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.541900] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 167.550970] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 167.560094] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 167.568347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.579008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.588277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.605971] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 167.616975] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 167.623698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 167.635215] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 167.642810] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.652116] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.663839] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.670530] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.686691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.695550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 11:56:51 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000000040)=0x7fb, 0x4) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x4000000000000d0, 0x0) [ 167.705522] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 167.733805] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 167.749201] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 167.775746] audit: type=1400 audit(1571313411.849:41): avc: denied { name_bind } for pid=7814 comm="syz-executor.2" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 167.777194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.814077] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.825145] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.832160] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.840241] audit: type=1400 audit(1571313411.879:42): avc: denied { node_bind } for pid=7814 comm="syz-executor.2" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 167.845368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.878961] audit: type=1400 audit(1571313411.879:43): avc: denied { name_connect } for pid=7814 comm="syz-executor.2" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 167.880126] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 167.918071] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 167.929587] hrtimer: interrupt took 67534 ns [ 167.933931] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 167.950081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.965655] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.975544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.988425] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.998525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 168.015410] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 168.030496] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.044071] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 168.057452] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 168.072197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 168.085526] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.094650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 168.108466] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.118543] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 168.138857] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 168.155908] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 168.188497] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.206427] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.218207] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 168.226204] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 168.242841] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 168.257377] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 168.265644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 168.278996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 168.293904] audit: type=1400 audit(1571313412.369:44): avc: denied { read } for pid=7820 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 168.320149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.330462] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 168.338411] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 168.349629] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 168.355813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 168.370817] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 168.382309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.393127] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.408923] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 168.417274] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 168.428092] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready 11:56:52 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) [ 168.443264] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.455820] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.596987] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 11:56:52 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 11:56:52 executing program 5: dup(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() wait4(0x0, 0x0, 0x80000000, 0x0) gettid() r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f0000000000)) ptrace(0x4206, r0) rt_tgsigqueueinfo(r0, r0, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) ptrace(0x4208, r0) 11:56:52 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:56:52 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ipv6_route\x00\xc9\xad\xd9z\xca\xd1N\xc9\xef\x9f\xf0\'@S\xc8\xa0\v\xf6\x13^\xb1r\xd0N\x16\xac?\xa8\xe9\xbbm\xf5\x98a\xa4E\xbc\x9eo\xea>\xd0\x8dBK\x81_\x05\x8cCOx.\xdf\xc8s\x9f\xf3D\xe2\x03\x00\x1d\xe8\xfb\xc2\x16\xb6\xfe\xbf\"\x14$xc\xc7L\xb4Ne\xb1\'c\xff\x8d/\xd4\xeaZq\xe4\xc8|\xe0\x8c&\xbd\x95Ml\xc3\x86%\xdc\b$~\xb6\x04\x9c\xe6\x86\xd8\xae_o\x1a\x84\xb3\xbd\x82\b\x97\xaf\xa7N\xc2\xda\\\xcf\x96\xe8\f\xc8\xe5\x1dX\xc7^\x06\xe6\xa3~\xc7\xd5\xdf\x7fa\xb2\t\xd9\xe3\xf4\xa1\xf5\xa7\xb4\x11*l\xa0\x0fYm\xe3\x7f') preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/55, 0x37}], 0x1, 0x0) write$apparmor_current(r1, &(0x7f0000000440)=ANY=[], 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) bind$alg(0xffffffffffffffff, 0x0, 0x0) 11:56:52 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) 11:56:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x98}]}, &(0x7f0000000000)='Q\xa2\xa2\x11\xbbo-\x95\xd3\xc0I\x960(U\x06\t.\xc3\t\xa4\xd5\x99\x02_2\x01\r\xf8\xedxR\xc2\a\xc0\x17\x15k3\xfc\xe7\x9d\xea\xe7\x19M#\"N\xe4\xe4\xc5\xe3!\xfd\x80\xb7', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080), 0x1c6}, 0x34) [ 168.697771] audit: type=1400 audit(1571313412.769:45): avc: denied { prog_load } for pid=7844 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 11:56:52 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ipv6_route\x00\xc9\xad\xd9z\xca\xd1N\xc9\xef\x9f\xf0\'@S\xc8\xa0\v\xf6\x13^\xb1r\xd0N\x16\xac?\xa8\xe9\xbbm\xf5\x98a\xa4E\xbc\x9eo\xea>\xd0\x8dBK\x81_\x05\x8cCOx.\xdf\xc8s\x9f\xf3D\xe2\x03\x00\x1d\xe8\xfb\xc2\x16\xb6\xfe\xbf\"\x14$xc\xc7L\xb4Ne\xb1\'c\xff\x8d/\xd4\xeaZq\xe4\xc8|\xe0\x8c&\xbd\x95Ml\xc3\x86%\xdc\b$~\xb6\x04\x9c\xe6\x86\xd8\xae_o\x1a\x84\xb3\xbd\x82\b\x97\xaf\xa7N\xc2\xda\\\xcf\x96\xe8\f\xc8\xe5\x1dX\xc7^\x06\xe6\xa3~\xc7\xd5\xdf\x7fa\xb2\t\xd9\xe3\xf4\xa1\xf5\xa7\xb4\x11*l\xa0\x0fYm\xe3\x7f') preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/55, 0x37}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:56:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0, 0x3}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20}], 0x20}, 0xfc) socket$kcm(0x29, 0x5, 0x0) [ 168.884232] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 11:56:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') sendfile(r0, r1, 0x0, 0x80040006) add_key$user(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 11:56:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:56:53 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xb, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000300}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 11:56:53 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) 11:56:53 executing program 4: unshare(0x6c060000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x5, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbb24fec2fba09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x49}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 11:56:53 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x0, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, 0x0, 0x0) 11:56:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:56:53 executing program 1: perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2900, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c09}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:56:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@fat=@nocase='nocase'}]}) [ 169.502528] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 11:56:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000022c0)=ANY=[@ANYBLOB="140000000301ffff000000000000"], 0x14}}, 0x0) 11:56:53 executing program 5: [ 169.587591] IPVS: ftp: loaded support on port[0] = 21 [ 169.593861] FAT-fs (loop2): bogus number of reserved sectors 11:56:53 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8}]]}}}]}, 0x40}}, 0x0) [ 169.629733] FAT-fs (loop2): Can't find a valid FAT filesystem 11:56:53 executing program 2: 11:56:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', 0x0, 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) [ 169.684653] audit: type=1400 audit(1571313413.759:46): avc: denied { create } for pid=7945 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 11:56:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:56:53 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x4e, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000000000000000ff"]}, 0xc6) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca3de6e", 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)={0x1c, r4, 0x100, 0x70bd27, 0x25dfdc00}, 0x1c}}, 0x40) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) pipe(&(0x7f0000000300)) [ 169.907104] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 11:56:54 executing program 4: 11:56:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', 0x0, 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:56:54 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) connect$pptp(r0, &(0x7f0000000480)={0x18, 0x2, {0x0, @empty}}, 0x1e) 11:56:54 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8}]]}}}]}, 0x40}}, 0x0) 11:56:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:56:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0d5e383e5b3c066ff000000e2", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002700)=[{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000040)='%', 0x186}, {&(0x7f0000002900)="c9", 0x20000041}], 0x2}], 0x1, 0x0) 11:56:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:56:54 executing program 4: 11:56:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', 0x0, 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:56:54 executing program 5: [ 170.666708] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 11:56:54 executing program 4: 11:56:54 executing program 2: 11:56:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:56:54 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8}]]}}}]}, 0x40}}, 0x0) 11:56:54 executing program 5: 11:56:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:56:55 executing program 2: 11:56:55 executing program 4: 11:56:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:56:55 executing program 5: 11:56:55 executing program 2: [ 171.047575] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 171.058695] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 11:56:55 executing program 4: 11:56:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:56:55 executing program 5: 11:56:55 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) 11:56:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:56:55 executing program 2: 11:56:55 executing program 4: 11:56:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 171.323132] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 11:56:55 executing program 5: 11:56:55 executing program 2: 11:56:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) [ 171.426269] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 11:56:55 executing program 4: 11:56:55 executing program 5: 11:56:55 executing program 2: 11:56:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:56:55 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) [ 171.589913] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 11:56:55 executing program 4: 11:56:55 executing program 5: 11:56:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:56:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:56:55 executing program 2: 11:56:55 executing program 4: [ 171.797004] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 171.835338] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 11:56:55 executing program 5: 11:56:56 executing program 2: 11:56:56 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) 11:56:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:56:56 executing program 4: 11:56:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:56:56 executing program 5: 11:56:56 executing program 4: 11:56:56 executing program 2: 11:56:56 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 172.179935] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 11:56:56 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) 11:56:56 executing program 5: 11:56:56 executing program 4: 11:56:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:56:56 executing program 2: 11:56:56 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:56:56 executing program 5: 11:56:56 executing program 4: 11:56:56 executing program 2: [ 172.477009] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 11:56:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:56:56 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) 11:56:56 executing program 5: 11:56:56 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:56:56 executing program 2: 11:56:56 executing program 4: [ 172.742447] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 11:56:56 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:56:56 executing program 2: 11:56:56 executing program 4: 11:56:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:56:57 executing program 5: 11:56:57 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) 11:56:57 executing program 5: 11:56:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820f050000003292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x1a1) recvfrom(r1, &(0x7f0000003240)=""/4096, 0x100000205, 0x0, 0x0, 0x415) 11:56:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401b402000270f7f8", 0x16}], 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) gettid() syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) syz_open_dev$vcsn(0x0, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@loopback}, 0x14) [ 173.081230] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 11:56:57 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:56:57 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) 11:56:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:56:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000001680)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0d5e383e5b3c066ff000000e2", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002700)=[{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000040)='%', 0x186}, {&(0x7f0000002900)="c9", 0x20000041}], 0x2}], 0x1, 0x0) 11:56:57 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:56:57 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0d5e383e5b3c066ff000000e2", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x80000) sendmmsg$alg(r1, &(0x7f0000002700)=[{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000040)='%', 0x186}, {&(0x7f0000002900)="c9", 0x20000041}], 0x2}], 0x1, 0x0) 11:56:57 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) [ 173.406225] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 173.442740] FAT-fs (loop2): Directory bread(block 46081) failed [ 173.449191] FAT-fs (loop2): Directory bread(block 46082) failed [ 173.494078] FAT-fs (loop2): Directory bread(block 46083) failed 11:56:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180), 0x0, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) [ 173.568755] FAT-fs (loop2): Directory bread(block 46084) failed 11:56:57 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 173.644753] FAT-fs (loop2): Directory bread(block 46085) failed [ 173.691141] FAT-fs (loop2): Directory bread(block 46086) failed [ 173.729395] FAT-fs (loop2): Directory bread(block 46087) failed 11:56:57 executing program 4: socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @empty}}}, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0d5e383e5b3c066ff000000e2", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002700)=[{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000040)='%', 0x186}, {&(0x7f0000002900)="c9", 0x20000041}], 0x2}], 0x1, 0x0) [ 173.749228] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 11:56:57 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) [ 173.796712] FAT-fs (loop2): Directory bread(block 46088) failed [ 173.836523] FAT-fs (loop2): Directory bread(block 46089) failed [ 173.875985] FAT-fs (loop2): Directory bread(block 46090) failed 11:56:58 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:56:58 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:56:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180), 0x0, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:56:58 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) 11:56:58 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x75, 0x100000) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r2, 0x40096102, 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000040)={r5}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r5, 0x9}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000001c0)={r6, 0x9}, &(0x7f00000002c0)=0x8) listen(r0, 0x8) syz_emit_ethernet(0x8a, &(0x7f0000000200)={@local, @random="192bce5e2ffb", [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0xc2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4}, @window={0x3, 0x3}, @exp_smc={0xfe, 0x6}, @sack={0x5, 0xffffff3d}, @md5sig={0x13, 0x12, "00000000000000000000000001000080"}, @md5sig={0x13, 0x12, "eaaab4d0ceb3a8d98f5d9ffd47fdc19a"}, @timestamp={0x8, 0xa}]}}}}}}}}, 0x0) [ 174.274351] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 11:56:58 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 174.317554] QAT: failed to copy from user cfg_data. [ 174.334983] validate_nla: 4 callbacks suppressed [ 174.334993] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 11:56:58 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) [ 174.414199] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 174.523462] QAT: failed to copy from user cfg_data. 11:56:58 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:56:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180), 0x0, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:56:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 174.657345] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 174.669346] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 11:56:59 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0bc5351, &(0x7f00000002c0)={0xfffffffa, 0x1, 'client0\x00', 0x7, "025074c3ff4542c2", "2d0a751e68f53e5e3ff0e2bf950da2350ea7b19807edddb40afb334e88e8a34c", 0x1, 0x3ff}) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r3, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) 11:56:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:56:59 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:56:59 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) 11:56:59 executing program 5: r0 = socket$inet6(0xa, 0x800, 0xfe) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000580)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xf0}}}}}}}, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) 11:56:59 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x40000000015, 0x805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:56:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 175.073273] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 11:56:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x183800) write$P9_RREADDIR(r0, &(0x7f0000000100)={0xe4, 0x29, 0x1, {0x8, [{{0x43b8081d00225d98, 0x3, 0x5}, 0x0, 0x7, 0x7, './file0'}, {{0x4, 0x0, 0x8}, 0x0, 0x3, 0x7, './file0'}, {{0x102, 0x2, 0x4}, 0x1000, 0x20, 0x7, './file0'}, {{0x104, 0x0, 0x4}, 0x3f, 0x80, 0x7, './file0'}, {{0x20, 0x4, 0x80000000}, 0x81, 0x6, 0x7, './file0'}, {{0x2, 0x1, 0x6}, 0x5, 0x40, 0x7, './file0'}, {{0x90, 0x1, 0x8}, 0x9, 0x2, 0x7, './file0'}]}}, 0xe4) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000600)="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", 0x115}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 11:56:59 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x40000000015, 0x805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:56:59 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) 11:56:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:56:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 175.362173] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 11:56:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea87294", 0x1d, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:56:59 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x40000000015, 0x805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:56:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:56:59 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) 11:56:59 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r1}) accept4$packet(r2, 0x0, &(0x7f0000000300), 0x7beec14cadff8881) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @perf_config_ext={0x80}, 0x1c9c8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r4 = dup2(r3, r3) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)={0x20000000000002, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000140)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x2010, r0, 0x0) write$UHID_GET_REPORT_REPLY(r4, &(0x7f0000000080), 0xa) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) personality(0x400000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) madvise(&(0x7f00000f3000/0x1000)=nil, 0x1000, 0x0) r5 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r6 = add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)="5bc34a08f7e9fc29fbe1062849a4e3c0ae8ccfc7e5c815a38a2ec35385a03a2be80c8ab326d9f647096cca629e519149ffd2cd83573c45be853fb3b8b6e4d3bf85cc5a9f0a0f9998dfbe4a4f3bb77b3797398d63dc2e50a29a27614716b382fba940511642e932ee847b2d9cdbd85cd640b810a86448e07f5c18cca5fa13f774f1812312ba020e29cc242e7230cc90cc6d3679a433ad6da711f8e60abd9ccfe5d600197d152801dd516dbcc89a4bff901549b311002ecc81", 0xb8, r5) keyctl$read(0xb, r6, &(0x7f00000001c0)=""/183, 0xb7) keyctl$clear(0x7, r6) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x48000) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, 0x0, 0x4004004) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) 11:57:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:00 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 175.880271] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 175.903700] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 176.070763] audit: type=1400 audit(1571313420.119:47): avc: denied { map } for pid=8395 comm="syz-executor.4" path="/dev/snd/seq" dev="devtmpfs" ino=15620 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 11:57:02 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10004, 0x0) setsockopt$inet_opts(r3, 0x0, 0xb, &(0x7f00000000c0)="43f6d2a3a92d24ee3467a574c7aa7a0fa3fc72a4e594255478aadb04c88b0ee4d72ec547ec29520e2a81f9f99523eea6862a1e387e6619c60bbe0a1673603857b0a198cb93627b39d563ba922b102da7cbb99477", 0x54) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') 11:57:02 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) 11:57:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea87294", 0x1d, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:57:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:02 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:02 executing program 4: socket$kcm(0x10, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffa}, 0x0, 0x2, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) r2 = userfaultfd(0x0) dup(r2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) openat$cgroup(r1, &(0x7f0000000480)='\x16\xeb\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, r1, 0x6, 0xffffffffffffffff, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_int(r1, 0x0, 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4\x02\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x8001) sendmsg(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f0000000100)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000000380)}, 0x0) write$cgroup_int(r3, &(0x7f0000000080)=0x1a001b00, 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000001880)='cgroup.type\x00', 0x2, 0x0) mkdir(&(0x7f00000004c0)='./file1\x00', 0x4) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000200)="4f5f1b3b87025a7b6086102c56f35e379975ddd1f873527272bab34c95c250047998c29ca65d2f6ed2da93bbaecb61ee61e58e17ef0320fa2f41086437addb3d617c22f09e57210611188b5fe36afe5e7a193ffd8dbca521bb51234aecfaa681b55e062c10583fbcc5677710292e84b4c424afc768131ea4b380", 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x236, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1, 0x0, 0xffffffffffffffc2}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffff) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000280)={0xf601}) syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x3, 0x2) 11:57:02 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 178.295601] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 178.309722] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 11:57:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:02 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) 11:57:02 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000000000)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 11:57:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea87294", 0x1d, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) [ 178.583730] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 178.613195] audit: type=1400 audit(1571313422.679:48): avc: denied { map_create } for pid=8438 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 11:57:02 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr="306a5d21ee10d65db6f65d9d42fe3542"}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0x10) sendfile(r3, r4, 0x0, 0xedc0) 11:57:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:02 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:02 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r2, 0x40096102, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000000)={0x6, {0x101, 0x8001, 0x5, 0x4}, {0x3, 0x8, 0x1, 0x4}, {0xffffff02, 0x7}}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) [ 178.685419] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 11:57:02 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) 11:57:02 executing program 2: r0 = socket(0x0, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e", 0x2c, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) [ 178.838537] QAT: failed to copy from user cfg_data. [ 178.897586] QAT: Invalid ioctl [ 178.901304] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 11:57:03 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) read$char_usb(0xffffffffffffffff, 0x0, 0x0) epoll_create1(0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x9b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000, 0x0, 0xfffffffd, 0x4, 0x7}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r3 = socket$pppoe(0x18, 0x1, 0x0) finit_module(r3, &(0x7f0000000080)='\x00', 0x8ca36dc31957897d) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/.yz1\'', 0x1ff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) io_setup(0x8, &(0x7f0000000040)=0x0) write$P9_RFSYNC(r4, &(0x7f0000000180)={0x7}, 0x7) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r6, 0x40096102, 0x0) statx(r6, &(0x7f0000000240)='./file0\x00', 0x2000, 0x40, &(0x7f0000000580)) fcntl$setstatus(r4, 0x4, 0x46600) io_submit(r5, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r4, &(0x7f0000000000), 0x10000}]) mkdirat(r4, &(0x7f00000000c0)='./file0\x00', 0x20) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r8 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r8, 0x40096102, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r8, 0xc0745645, &(0x7f00000001c0)={0x2, [0x401, 0x50e3, 0xbc, 0xffff, 0x6, 0x9c5, 0x7, 0x5, 0x7c, 0x3, 0xffff, 0x1, 0x3b, 0x1000, 0x8000, 0xbb, 0x2, 0xffe1, 0x0, 0x7, 0x9, 0xffff, 0x0, 0x7, 0x1, 0x9, 0x3, 0x8001, 0x100, 0xfff, 0x7f, 0x4, 0x40, 0x80, 0x4, 0xfffb, 0x6, 0x5, 0x0, 0x6, 0xff, 0x1, 0x0, 0x6, 0x3f0, 0x7f, 0x5, 0x3], 0x1}) 11:57:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:03 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r2}]]}}}]}, 0x40}}, 0x0) [ 178.954702] F2FS-fs (loop5): Unable to read 1th superblock [ 178.974578] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 11:57:03 executing program 2: r0 = socket(0x0, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 179.008639] F2FS-fs (loop5): Unable to read 2th superblock [ 179.042732] F2FS-fs (loop5): Unable to read 1th superblock 11:57:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e", 0x2c, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) [ 179.072752] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 179.093227] F2FS-fs (loop5): Unable to read 2th superblock [ 179.106156] QAT: failed to copy from user cfg_data. 11:57:03 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r2}]]}}}]}, 0x40}}, 0x0) [ 179.173111] QAT: failed to copy from user cfg_data. [ 179.179242] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 179.208288] QAT: Invalid ioctl 11:57:03 executing program 2: r0 = socket(0x0, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 179.252420] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 179.262475] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 11:57:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x10001, 0x200000) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r4, 0x40096102, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x104, 0x63e1afdcada0e92}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000340)={0xa, 0x4, 0xfa00, {r5}}, 0xc) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400050000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="440400002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000e00ffffffff00000000080001006362710018040200040406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000500060000000000000005000000"], 0x444}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002e00070200"/20, @ANYRES32=r6, @ANYBLOB="ecfff0f800c00e00fbff00ce"], 0x24}}, 0x0) [ 179.294733] QAT: Invalid ioctl 11:57:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:03 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r2}]]}}}]}, 0x40}}, 0x0) [ 179.363826] QAT: failed to copy from user cfg_data. 11:57:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e", 0x2c, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) [ 179.440675] QAT: failed to copy from user cfg_data. [ 179.446978] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 179.486457] QAT: failed to copy from user cfg_data. [ 179.495127] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 179.538453] QAT: failed to copy from user cfg_data. [ 179.550884] QAT: failed to copy from user cfg_data. [ 179.598873] QAT: Invalid ioctl 11:57:03 executing program 4: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r1, 0x40096102, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x3, &(0x7f0000000000)='/w\x00'}, 0x30) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6, 0x0, 0x0, 0x4}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001440)=ANY=[@ANYBLOB="020300030c0000000000002000000000020009004000000000412d1fbc000000030006000000f9180200ee00fbb70000d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0003f0100000000fca0d971e9fd2bb4b88e524ae03e6521c84c1d7afa5cac81f30f16cd3ba77e4d5a8a682d271d4e0b57a07686d8cd335d8541ca148e882dc5bafceed2dedb06c1d95dfcc7e08e6dc8bbcceb36c800"], 0x60}}, 0x0) 11:57:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:03 executing program 2: r0 = socket(0x40000000015, 0x0, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:03 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r3}]]}}}]}, 0x40}}, 0x0) 11:57:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63c", 0x33, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:57:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_settime(0x6, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0xffffffffa0020000) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x3000000000016) socket$inet6_tcp(0xa, 0x1, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40c00, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="b4000000000000006111040000000000851000000200000085000000000000009502ffff00000040"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x101c00, 0x0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x3) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 11:57:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 179.739398] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 179.751068] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 179.776666] QAT: failed to copy from user cfg_data. 11:57:03 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r3}]]}}}]}, 0x40}}, 0x0) 11:57:03 executing program 2: r0 = socket(0x40000000015, 0x0, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63c", 0x33, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:57:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 179.943643] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 11:57:04 executing program 2: r0 = socket(0x40000000015, 0x0, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 180.037797] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 180.232862] QAT: failed to copy from user cfg_data. 11:57:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=0xffffffffffffffff) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) sendto(r0, &(0x7f0000000180)='\x00\x00\x00', 0x3, 0x8055, 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x5, 0x200000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000140)=0xffffffffffff8001, 0x8) 11:57:04 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r3}]]}}}]}, 0x40}}, 0x0) 11:57:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63c", 0x33, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:57:04 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000540), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, 0x1}, 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r1, 0x40096102, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10201000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r2, 0x200, 0x6, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40014}, 0x40) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'os2.', 'vmnet1vmnet0mime_type!\x00'}) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, 0x8, {0x999}}, 0x18) dup3(r3, r0, 0x0) 11:57:04 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 180.353712] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 180.365422] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 180.382727] QAT: failed to copy from user cfg_data. 11:57:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc676", 0x37, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:57:04 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) 11:57:04 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="34000000b7448f78b8f0b3c1000000000a00000000000000000000c8d053fd060020000000040003d8fbe8a6da78b36601326776760a8bab0079612d0700a83c7ead6d646f1092ec561f0000"], 0x34}}, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x11a000, 0x0) ioctl$EVIOCSABS0(r2, 0x40096102, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r3, 0x40096102, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000100)={r0}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000008}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00002cbd7000fbdbdf25020000001c00070008000100", @ANYRES32=r2, @ANYBLOB="08f45000", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="08000100000000000c00080003000000000000000c00080040000000000000000c0005000800000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x44028871}, 0x40040) [ 180.540464] QAT: failed to copy from user cfg_data. 11:57:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x0, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 180.585787] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 180.611999] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 11:57:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="3400000010000002ffffffff0000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000c00bbd205b82c3dff49b34838f006ba8c670c00"], 0x34}}, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r2, 0x40096102, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r3, 0x40096102, 0x0) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, &(0x7f0000000000)) [ 180.636102] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=17591 sclass=netlink_route_socket pig=8625 comm=syz-executor.4 11:57:04 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:04 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) [ 180.726935] QAT: failed to copy from user cfg_data. 11:57:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc676", 0x37, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) [ 180.782777] QAT: Invalid ioctl 11:57:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x0, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 180.839039] QAT: failed to copy from user cfg_data. [ 180.842686] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pig=8631 comm=syz-executor.4 [ 180.873110] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 180.879252] QAT: failed to copy from user cfg_data. 11:57:04 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 180.887092] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=17591 sclass=netlink_route_socket pig=8625 comm=syz-executor.4 [ 180.891196] QAT: Invalid ioctl [ 180.947450] QAT: failed to copy from user cfg_data. [ 180.953869] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 180.980090] QAT: failed to copy from user cfg_data. 11:57:05 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) [ 181.007474] QAT: failed to copy from user cfg_data. 11:57:05 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 181.036256] QAT: Invalid ioctl 11:57:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='\x00\x00\x00\x80\x00\x00\a\x00', 0x40, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) creat(&(0x7f00000002c0)='./bus\x00', 0x0) 11:57:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x0, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 181.103339] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 11:57:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='.]\x117\xc9\xc8Y\xeea\xd3\xf1\xf9\x95{m5n/cgroup.cpu/syz1\x001\x8c9\x90\x96\xd4\x1e\xd8(~g\xaf\xd7A7\xb1\x9d\xdeF>\xb63\x9b\xbfP\xab!\x05\xa8\x1b^%\x00\xd5\x98ni>5Q=\xcb\xead\x06cn\xf2X\xe9\xd1\xc6\xd1\xd8\x1bqh.\xb5\xb8\xb2\xb0\xa08\xbc', 0x200002, 0x0) fchdir(r1) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000000140)=""/189, 0xbd) 11:57:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc676", 0x37, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:57:05 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:05 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) 11:57:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 181.257222] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 11:57:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000040), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x93}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0xfffd, 0x0, 0x209, 0x9, 0xf0, 0x8001, 0x5c, 0xf2, r2}, &(0x7f0000000180)=0x20) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_int(r0, 0x29, 0x4a, 0x0, 0x3a3) fcntl$setstatus(r0, 0x4, 0x2000) 11:57:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001d00051bd25a80648c63940d0124fc00100002400200a06d053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x80000000, 0x1000) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000017c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000003180)=0x3ff) r3 = socket$inet_sctp(0x2, 0x1, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="0100a83f", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000040)={r5}, &(0x7f0000000080)=0x10) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r6, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f00000032c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f0000003280)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000003340)={&(0x7f0000003300)={0x1c, r10, 0x0, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000}, 0x8802) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd00010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) ioctl$sock_inet6_SIOCDELRT(r6, 0x890c, &(0x7f0000000100)={@mcast1, @mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4ea, 0x3, 0x825e, 0x500, 0x9, 0x0, r11}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000000c0)={r5, 0x1, 0x2, [0xbb, 0xbd1]}, 0xc) sendmmsg$inet6(r1, &(0x7f0000003000)=[{{&(0x7f00000001c0)={0xa, 0x4e20, 0x8000, @mcast1, 0xbfd}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000300)="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", 0x1000}], 0x1}}, {{&(0x7f0000000240)={0xa, 0x4e24, 0x7, @mcast1, 0x30}, 0x1c, &(0x7f0000001400)=[{&(0x7f0000001300)="b4e723c58035a0c2d4bfc1e9589438fc44aa19937b59940b521c5639a98bb4a3c419904a576ee0d720", 0x29}, {&(0x7f0000001340)="baa3d0fc9c5a7f8d38dc4455be73f5a3c1b352ddb8f9abc55c8536d8e0e75c30a39225bead6e46ff52e4485b7bf9e603d29e5ce0b102e873bf579f7555029ef6b86f237e8f4d57770ce3189e61a94c005abd74d57b98953047aec97dcf9edaf9a231b9c47f30cd3b3333804298b736d7c68103b067ac0c7f0b9b602e854f956f03010c72e4a1decdbf835686108c75f6878a", 0x92}], 0x2, &(0x7f0000001440)=[@rthdr={{0x38, 0x29, 0x39, {0x3c, 0x4, 0x4, 0x80, 0x0, [@mcast1, @empty]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x4}}, @hoplimit={{0x14, 0x29, 0x34, 0x400}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x77, 0x6, 0x0, 0x9, 0x0, [@ipv4={[], [], @empty}, @loopback, @remote]}}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x0, 0x2, 0x0, 0x6, 0x0, [@mcast2]}}}, @dstopts_2292={{0x18, 0x29, 0x4, {0x73}}}, @flowinfo={{0x14}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x800}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x9e68}}], 0x138}}, {{&(0x7f0000001580)={0xa, 0x4e24, 0x1, @rand_addr="9ac9f7bd2ac899f0b825bbfe209153a8"}, 0x1c, &(0x7f0000002c00)=[{&(0x7f00000015c0)="c22878a132b44349c9fbb5a0c675a44dcdc9a30af430dd2740d55b61a60b9a3c3df4f06a51c43c8bd3454210f65ae80a2c3d895f41c4ce45a129ec5c07aaf5f7d90f6172fde01993d2ddbde3ceceb32f62c78fe9ecc9f430ba37449ba95574314b7648b78b871de8350e5ad7319536b05a4ac69d044e65a4fe251a65de36cec26a80bf61139f2aca1e21d5b67a2715c5ae41f30af06b65a1b505a4e1adebb2cd1ea83828c8a9518677c604adf93203cddad1edf824807b8cae3ff9070c0c0dd6f6288b9f718df0e257d1c5245526ac3a33978bee1a9ec0de59", 0xd9}, {&(0x7f00000016c0)="f434db633e8959812989adb295d60cc1eb46a4053330727c9278594376f3aba54e8d192558e88fbee27aab3ccc1a80250874c39f6ecd7a94f86b5dcffd6dbfce3011cd122ea4e97f5986ea80f83d71b6e13443768092b2645ff585f0deb0fd3bbcbcb66d40041e70bc7268616b60d75aa206fdda3f358a5b5801b2b7f0b38fc0cc418e0bcfd81c9288e381635338c691f320615749e9d7f1038ce1da5d0b89f36c62dde47ad71a6477fdf1975ec2a44b3319690143ac187798eb65accecf8881c3fa", 0xc2}, {&(0x7f0000003100)="ddc6429f606e66ae27e945c07aaa4d239ece96f5887033b76db72dbdf5045a54d672f145130369ef31d0321731c335b36dae38ab3f4d12c764453557ce50b7550000", 0x42}, {&(0x7f0000001800)="6e43959c675e2b9d2cc764c2a255e21623f362372e8a61c48a87a187c7ac557f2d32638a585a6f600827935704791881fd35b7639de200452070f038b760d1084b94a9dde51311813062baee3468e3b443add1d3f73f78963a4e0fdfd1fb1d748e83f1d2d505be3064acca0f460a74fcc4a6d5fd70730ae7e08cd5b6904fe79bdbc6d5ac74dc283f24afc46405859de54fb7a3e9e0bf02b8d6bc0f9c4a7cb3a5535635708e5bd473e311c2650ac239af9a6d9c8d5d9e4b3a5329b64017b51f9f1c804d556c0a2103375b29464393c04b1eabf629104310a41e1557b17f378a8cb2565076299578b6c6b30c9491299ef2c292", 0xf2}, {&(0x7f0000001900)="f6ad6c5c434cbaa766e9f9a5c88bb62031bc9ce3d4807dd6c1b4fe584c79635fd2deeafe40678f8dc076b7cd9d1a78fcdccc54cf7bf307287cb2f961da1e16577602a888d0d1e5de7c401c2ef668ba3077b4ed3e45f06bc465a0cb1058a1b6b4db3c9d20a1efabd18b39a8d998d37d0d2ad7038554edd0bd2aef783682b7cd35138e18b18e3577c1dbe080beb0ed7a03a3a37c6473052efa064392402954eed2cdc4b7fd072a6fa0d19f1d0a", 0xac}, {&(0x7f00000019c0)="884e8d7d4dcf286d6b47ea737484670383bd00bef33d97ade50200ab657ba1e003dd31fe9eb31e3c30f5661ddbd83c04c2ac0e3f74f4cd92a7aff398a6c1b2f30350799bff771609696fea194c7e98df82f96e95484f968ef7e5616583b5b3fc8cf5df845d5fcf", 0x67}, {&(0x7f0000001a40)="7273ec12", 0x4}, {&(0x7f0000001a80)="9b09d7015ad27215348458498b66e265a27ef661972ccc3b5c8fff3990974c2822b992976fdb616dd6a39c3f2155c94d7b1bba6d258f02c07c4ad712af663e2c06bd841f5676b4faa7580e0ea5f40814e078686584649200b3a25d9b3ccf01086eef628b26dcb47c13a91cab990c0f27a573964045e63af0d95ddeb676138a5d03e9c4ec54abbc8fcb0f8e27ea073901e34ef51ab8f55ed88386e2", 0x9b}, {&(0x7f0000001b40)="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", 0x1000}, {&(0x7f0000002b40)="faf93accd0cce76ef511ad3bc05d99cbbdadf903344d1cc9b223a913c6054b39eaaaaa753dacdeec290ceb4b8ca6956918b6d8bf94c5725a6d1d3017719d3b7f7b5074477c6bb7965f06e24845ede1004ce37dc26573134c9b985b989d6c741b511b1edeae2e9747deeb838093cd169f17eb8b434a546ffe2af010ae154d4224ea", 0x81}], 0xa}}, {{&(0x7f0000002cc0)={0xa, 0x4e23, 0x2, @remote}, 0x1c, &(0x7f0000002f80)=[{&(0x7f0000002d00)="c41cd027eb96b4ba99b12eaa", 0xc}, {&(0x7f0000002d40)="ef8f9d7df81e4335c1ecabd9", 0xc}, {&(0x7f0000002d80)="145dd03b54f5c75a9607880c64ff1563a52e30b6ccf975e31b32bea23a4a9122dcafacdbf860f27392e2", 0x2a}, {&(0x7f0000002dc0)="9553678497dc147cd3a9fded476b3aabde227afeebac47e70e2547e67fd76ed9ddbdcca90d0991a0a00062c0ca591c2a06d55afc19c119dd174f5e5572f351f2327eb8cd91d3270d45488ba9827db9a721a7a2c065fd8475918e0dca995e1ee41ed48c9ff1d92e22fa067a0aef5aa90d5ba7c29a2253ae73bc28a5be9c", 0x7d}, {&(0x7f0000002e40)="50031a73d4b9ef12f1738272f2f0ce9a917cb4186433c3fa32d8bc49cb0d5c5d2b6ce4cdecec0166ba76ea64e512a0390def370af447b98d24e24a5b59d4abd67c16576ae856ab29b3b473c4ab551cbbeee3c894770113cfd6b3afcb8f8cc51ea7d7c4e9b32b7abda245b3d2a1492ad148dc27330d2735aabc09a04c2a7a55d954d850925b8978193033b764f94cbaa09981548965f2a15a2c89156b49c0c5a6d35096cdc60bae1f52b37a7f136fb9327d", 0xb1}, {&(0x7f0000002f00)="474642a9f0974a2459e677786a6ee4ac4311f794d7dba50bf1c0623cc1b61843eefa3b66303aa655af52d9598a2143efb8e009647ed10c2378c602f7e95d975ddb8111b01df44047dabc4118026c55fe5b80ec7a316a22a8f3e999b26374ac", 0x5f}], 0x6}}], 0x4, 0x80) r12 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r12, 0x40096102, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r12, 0x0, 0x2a, &(0x7f00000031c0)={0x10000, {{0x2, 0x4e24, @multicast1}}}, 0x88) 11:57:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253", 0x39, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:57:05 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 181.413785] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 11:57:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:05 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 181.525667] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 181.562604] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 11:57:05 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r3}]]}}}]}, 0x40}}, 0x0) 11:57:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x0, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 181.678683] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 11:57:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253", 0x39, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:57:05 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, 0x0, 0x0) [ 181.793860] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 11:57:05 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, 0x0, 0x0) [ 181.836770] QAT: failed to copy from user cfg_data. 11:57:05 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r3}]]}}}]}, 0x40}}, 0x0) [ 181.878098] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 181.926972] bond0: Enslaving veth5 as an active interface with an up link [ 182.044086] syz-executor.5 (8697) used greatest stack depth: 22368 bytes left 11:57:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253", 0x39, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:57:06 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, 0x0, 0x0) 11:57:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:06 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r3}]]}}}]}, 0x40}}, 0x0) 11:57:06 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001d00051bd25a80648c63940d0124fc00100002400200a06d053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x80000000, 0x1000) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000017c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000003180)=0x3ff) r3 = socket$inet_sctp(0x2, 0x1, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="0100a83f", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000040)={r5}, &(0x7f0000000080)=0x10) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r6, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f00000032c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f0000003280)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000003340)={&(0x7f0000003300)={0x1c, r10, 0x0, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000}, 0x8802) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd00010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) ioctl$sock_inet6_SIOCDELRT(r6, 0x890c, &(0x7f0000000100)={@mcast1, @mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4ea, 0x3, 0x825e, 0x500, 0x9, 0x0, r11}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000000c0)={r5, 0x1, 0x2, [0xbb, 0xbd1]}, 0xc) sendmmsg$inet6(r1, &(0x7f0000003000)=[{{&(0x7f00000001c0)={0xa, 0x4e20, 0x8000, @mcast1, 0xbfd}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000300)="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", 0x1000}], 0x1}}, {{&(0x7f0000000240)={0xa, 0x4e24, 0x7, @mcast1, 0x30}, 0x1c, &(0x7f0000001400)=[{&(0x7f0000001300)="b4e723c58035a0c2d4bfc1e9589438fc44aa19937b59940b521c5639a98bb4a3c419904a576ee0d720", 0x29}, {&(0x7f0000001340)="baa3d0fc9c5a7f8d38dc4455be73f5a3c1b352ddb8f9abc55c8536d8e0e75c30a39225bead6e46ff52e4485b7bf9e603d29e5ce0b102e873bf579f7555029ef6b86f237e8f4d57770ce3189e61a94c005abd74d57b98953047aec97dcf9edaf9a231b9c47f30cd3b3333804298b736d7c68103b067ac0c7f0b9b602e854f956f03010c72e4a1decdbf835686108c75f6878a", 0x92}], 0x2, &(0x7f0000001440)=[@rthdr={{0x38, 0x29, 0x39, {0x3c, 0x4, 0x4, 0x80, 0x0, [@mcast1, @empty]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x4}}, @hoplimit={{0x14, 0x29, 0x34, 0x400}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x77, 0x6, 0x0, 0x9, 0x0, [@ipv4={[], [], @empty}, @loopback, @remote]}}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x0, 0x2, 0x0, 0x6, 0x0, [@mcast2]}}}, @dstopts_2292={{0x18, 0x29, 0x4, {0x73}}}, @flowinfo={{0x14}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x800}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x9e68}}], 0x138}}, {{&(0x7f0000001580)={0xa, 0x4e24, 0x1, @rand_addr="9ac9f7bd2ac899f0b825bbfe209153a8"}, 0x1c, &(0x7f0000002c00)=[{&(0x7f00000015c0)="c22878a132b44349c9fbb5a0c675a44dcdc9a30af430dd2740d55b61a60b9a3c3df4f06a51c43c8bd3454210f65ae80a2c3d895f41c4ce45a129ec5c07aaf5f7d90f6172fde01993d2ddbde3ceceb32f62c78fe9ecc9f430ba37449ba95574314b7648b78b871de8350e5ad7319536b05a4ac69d044e65a4fe251a65de36cec26a80bf61139f2aca1e21d5b67a2715c5ae41f30af06b65a1b505a4e1adebb2cd1ea83828c8a9518677c604adf93203cddad1edf824807b8cae3ff9070c0c0dd6f6288b9f718df0e257d1c5245526ac3a33978bee1a9ec0de59", 0xd9}, {&(0x7f00000016c0)="f434db633e8959812989adb295d60cc1eb46a4053330727c9278594376f3aba54e8d192558e88fbee27aab3ccc1a80250874c39f6ecd7a94f86b5dcffd6dbfce3011cd122ea4e97f5986ea80f83d71b6e13443768092b2645ff585f0deb0fd3bbcbcb66d40041e70bc7268616b60d75aa206fdda3f358a5b5801b2b7f0b38fc0cc418e0bcfd81c9288e381635338c691f320615749e9d7f1038ce1da5d0b89f36c62dde47ad71a6477fdf1975ec2a44b3319690143ac187798eb65accecf8881c3fa", 0xc2}, {&(0x7f0000003100)="ddc6429f606e66ae27e945c07aaa4d239ece96f5887033b76db72dbdf5045a54d672f145130369ef31d0321731c335b36dae38ab3f4d12c764453557ce50b7550000", 0x42}, {&(0x7f0000001800)="6e43959c675e2b9d2cc764c2a255e21623f362372e8a61c48a87a187c7ac557f2d32638a585a6f600827935704791881fd35b7639de200452070f038b760d1084b94a9dde51311813062baee3468e3b443add1d3f73f78963a4e0fdfd1fb1d748e83f1d2d505be3064acca0f460a74fcc4a6d5fd70730ae7e08cd5b6904fe79bdbc6d5ac74dc283f24afc46405859de54fb7a3e9e0bf02b8d6bc0f9c4a7cb3a5535635708e5bd473e311c2650ac239af9a6d9c8d5d9e4b3a5329b64017b51f9f1c804d556c0a2103375b29464393c04b1eabf629104310a41e1557b17f378a8cb2565076299578b6c6b30c9491299ef2c292", 0xf2}, {&(0x7f0000001900)="f6ad6c5c434cbaa766e9f9a5c88bb62031bc9ce3d4807dd6c1b4fe584c79635fd2deeafe40678f8dc076b7cd9d1a78fcdccc54cf7bf307287cb2f961da1e16577602a888d0d1e5de7c401c2ef668ba3077b4ed3e45f06bc465a0cb1058a1b6b4db3c9d20a1efabd18b39a8d998d37d0d2ad7038554edd0bd2aef783682b7cd35138e18b18e3577c1dbe080beb0ed7a03a3a37c6473052efa064392402954eed2cdc4b7fd072a6fa0d19f1d0a", 0xac}, {&(0x7f00000019c0)="884e8d7d4dcf286d6b47ea737484670383bd00bef33d97ade50200ab657ba1e003dd31fe9eb31e3c30f5661ddbd83c04c2ac0e3f74f4cd92a7aff398a6c1b2f30350799bff771609696fea194c7e98df82f96e95484f968ef7e5616583b5b3fc8cf5df845d5fcf", 0x67}, {&(0x7f0000001a40)="7273ec12", 0x4}, {&(0x7f0000001a80)="9b09d7015ad27215348458498b66e265a27ef661972ccc3b5c8fff3990974c2822b992976fdb616dd6a39c3f2155c94d7b1bba6d258f02c07c4ad712af663e2c06bd841f5676b4faa7580e0ea5f40814e078686584649200b3a25d9b3ccf01086eef628b26dcb47c13a91cab990c0f27a573964045e63af0d95ddeb676138a5d03e9c4ec54abbc8fcb0f8e27ea073901e34ef51ab8f55ed88386e2", 0x9b}, {&(0x7f0000001b40)="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", 0x1000}, {&(0x7f0000002b40)="faf93accd0cce76ef511ad3bc05d99cbbdadf903344d1cc9b223a913c6054b39eaaaaa753dacdeec290ceb4b8ca6956918b6d8bf94c5725a6d1d3017719d3b7f7b5074477c6bb7965f06e24845ede1004ce37dc26573134c9b985b989d6c741b511b1edeae2e9747deeb838093cd169f17eb8b434a546ffe2af010ae154d4224ea", 0x81}], 0xa}}, {{&(0x7f0000002cc0)={0xa, 0x4e23, 0x2, @remote}, 0x1c, &(0x7f0000002f80)=[{&(0x7f0000002d00)="c41cd027eb96b4ba99b12eaa", 0xc}, {&(0x7f0000002d40)="ef8f9d7df81e4335c1ecabd9", 0xc}, {&(0x7f0000002d80)="145dd03b54f5c75a9607880c64ff1563a52e30b6ccf975e31b32bea23a4a9122dcafacdbf860f27392e2", 0x2a}, {&(0x7f0000002dc0)="9553678497dc147cd3a9fded476b3aabde227afeebac47e70e2547e67fd76ed9ddbdcca90d0991a0a00062c0ca591c2a06d55afc19c119dd174f5e5572f351f2327eb8cd91d3270d45488ba9827db9a721a7a2c065fd8475918e0dca995e1ee41ed48c9ff1d92e22fa067a0aef5aa90d5ba7c29a2253ae73bc28a5be9c", 0x7d}, {&(0x7f0000002e40)="50031a73d4b9ef12f1738272f2f0ce9a917cb4186433c3fa32d8bc49cb0d5c5d2b6ce4cdecec0166ba76ea64e512a0390def370af447b98d24e24a5b59d4abd67c16576ae856ab29b3b473c4ab551cbbeee3c894770113cfd6b3afcb8f8cc51ea7d7c4e9b32b7abda245b3d2a1492ad148dc27330d2735aabc09a04c2a7a55d954d850925b8978193033b764f94cbaa09981548965f2a15a2c89156b49c0c5a6d35096cdc60bae1f52b37a7f136fb9327d", 0xb1}, {&(0x7f0000002f00)="474642a9f0974a2459e677786a6ee4ac4311f794d7dba50bf1c0623cc1b61843eefa3b66303aa655af52d9598a2143efb8e009647ed10c2378c602f7e95d975ddb8111b01df44047dabc4118026c55fe5b80ec7a316a22a8f3e999b26374ac", 0x5f}], 0x6}}], 0x4, 0x80) r12 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r12, 0x40096102, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r12, 0x0, 0x2a, &(0x7f00000031c0)={0x10000, {{0x2, 0x4e24, @multicast1}}}, 0x88) 11:57:06 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x9fab2b0b298ce3dd, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000040)={r3}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000380)={r3, 0x7f}, 0x8) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r5, 0x40096102, 0x0) ioctl$DRM_IOCTL_VERSION(r5, 0xc0406400, &(0x7f00000003c0)={0x82d5, 0x6, 0xffff, 0x73, &(0x7f0000000480)=""/115, 0x67, &(0x7f00000006c0)=""/103, 0xc0, &(0x7f0000001780)=""/192}) mount(&(0x7f00000000c0)=@sr0='/dev/sr0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='virtiofs\x00', 0x22408, &(0x7f0000000280)='em1^\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) preadv(r4, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) read$FUSE(r4, 0x0, 0x0) read$FUSE(r4, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r4, &(0x7f0000000300)={0x50, 0x0, 0x1}, 0x50) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r6, &(0x7f0000000080)="39a112", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) ftruncate(r6, 0x81) mkdir(&(0x7f00000001c0)='./file0/file1\x00', 0x0) write$FUSE_ENTRY(r4, &(0x7f0000000540)={0x90, 0x0, 0x3}, 0x90) 11:57:06 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 182.225867] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 11:57:06 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) [ 182.293320] QAT: failed to copy from user cfg_data. 11:57:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 182.383477] QAT: Invalid ioctl 11:57:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:57:06 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 182.404126] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 11:57:06 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) [ 182.520060] QAT: failed to copy from user cfg_data. [ 182.524171] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 11:57:06 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 182.592278] bond0: Enslaving veth7 as an active interface with an up link 11:57:06 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) 11:57:06 executing program 4: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0)="240000001a0025f00485bc04fef7001d020b49ffed000000800328000800030001000000", 0x24) r0 = socket(0x10, 0x400000000080803, 0x0) write(r0, &(0x7f00000001c0)="240000001a0025f00485bc04fef7001d020b", 0x12) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x0, 0x84) r3 = dup3(r1, r2, 0x0) sendto$inet(r3, &(0x7f0000fa3fff), 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000004c0)=ANY=[@ANYBLOB="e4258efa03fde47352e2626ed301bf4c91aabc07fcd9c7121002da57de2d619deb804dfe215c0dff10b4f37f666118564bfe56923bcfb9034587de7791e6868182c9751ccbea3c825cdd88a7aa739e2c2e8c7d0713c920d97c5aa6bc67f69ead968eb179013f74ad896ea9e0b19566dec2b427c1f5e255e667d798a8398458c3f69ecc1c750e4e2600"/159, @ANYRES32=0x0], &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x1, 0x8000, 0x204, 0x1f, 0x3f, 0x1, 0xfffffffb, 0x7, r4}, &(0x7f0000000200)=0x20) ioctl$TUNSETCARRIER(r3, 0x400454e2, &(0x7f00000000c0)) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r5, 0x4}, 0x8) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20004ffc, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0xa, &(0x7f0000000040)=0x2000000000000074, 0x4) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000100)={0xffffff00, 0x781, 0x0, 0x0}) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r6, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000880)=ANY=[@ANYBLOB="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"]) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) 11:57:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:06 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000700)={'team0\x00\x00\x00\x00\x00\x00\x00\xf7\x00', @local}) socketpair(0x0, 0x20000000000001, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x2b, 0x4000000000000001, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r1, 0x40096102, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000700)={'team0\x00\x03\x80\x00\x00\x00\x00\xf7\x00'}) 11:57:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:57:06 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) 11:57:06 executing program 2 (fault-call:2 fault-nth:0): r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 182.836332] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 11:57:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:57:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, 0x0, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 182.942652] FAULT_INJECTION: forcing a failure. [ 182.942652] name failslab, interval 1, probability 0, space 0, times 1 [ 182.997724] CPU: 0 PID: 8818 Comm: syz-executor.2 Not tainted 4.19.79 #0 [ 183.004981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.014445] Call Trace: [ 183.017126] dump_stack+0x172/0x1f0 [ 183.020791] should_fail.cold+0xa/0x1b [ 183.025645] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 183.030795] ? lock_downgrade+0x880/0x880 [ 183.035013] __should_failslab+0x121/0x190 [ 183.039353] should_failslab+0x9/0x14 [ 183.043196] __kmalloc+0x2e2/0x750 [ 183.046764] ? trace_hardirqs_on+0x67/0x220 [ 183.046784] ? release_sock+0x156/0x1c0 [ 183.046803] ? rds_message_alloc+0x4a/0x230 [ 183.046820] rds_message_alloc+0x4a/0x230 [ 183.046836] rds_sendmsg+0xfc4/0x2f90 [ 183.046864] ? rds_send_drop_to+0x1620/0x1620 [ 183.046881] ? copy_msghdr_from_user+0x2d0/0x430 [ 183.046903] ? selinux_socket_sendmsg+0x36/0x40 [ 183.060033] ? rds_send_drop_to+0x1620/0x1620 [ 183.060053] sock_sendmsg+0xd7/0x130 [ 183.060069] ? sock_sendmsg+0xd7/0x130 [ 183.060085] ___sys_sendmsg+0x803/0x920 [ 183.060101] ? copy_msghdr_from_user+0x430/0x430 [ 183.060121] ? lock_downgrade+0x880/0x880 [ 183.060136] ? kasan_check_read+0x11/0x20 [ 183.060155] ? __fget+0x367/0x540 [ 183.060173] ? iterate_fd+0x360/0x360 [ 183.060195] ? __fget_light+0x1a9/0x230 [ 183.060211] ? __fdget+0x1b/0x20 [ 183.060223] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 183.060241] __sys_sendmsg+0x105/0x1d0 [ 183.084010] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 183.087409] ? __ia32_sys_shutdown+0x80/0x80 [ 183.087441] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 183.087456] ? do_syscall_64+0x26/0x620 [ 183.087469] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 183.087487] ? do_syscall_64+0x26/0x620 [ 183.168765] __x64_sys_sendmsg+0x78/0xb0 [ 183.172854] do_syscall_64+0xfd/0x620 [ 183.176686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 183.184344] RIP: 0033:0x459a59 [ 183.187908] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 183.206833] RSP: 002b:00007fc1eae44c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 183.214570] RAX: ffffffffffffffda RBX: 00007fc1eae44c90 RCX: 0000000000459a59 [ 183.222373] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 183.229660] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 183.237081] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc1eae456d4 [ 183.245167] R13: 00000000004c7b76 R14: 00000000004dda00 R15: 0000000000000004 11:57:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, 0x0) 11:57:07 executing program 2 (fault-call:2 fault-nth:1): r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:07 executing program 4: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='ramfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0x400007f) mkdir(&(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x40096102, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000040)) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000400)={0x80, {{0x2, 0x4e22, @remote}}, 0x3, 0x5, [{{0x2, 0x4e23, @multicast2}}, {{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e23, @local}}, {{0x2, 0x4e21, @loopback}}, {{0x2, 0x4e22, @broadcast}}]}, 0x310) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) renameat(r1, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000003c0)='./file0\x00') [ 183.554807] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 183.579658] EXT4-fs (loop0): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 11:57:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, 0x0, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:07 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) [ 183.676323] QAT: failed to copy from user cfg_data. 11:57:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, 0x0) [ 183.716051] QAT: Invalid ioctl 11:57:07 executing program 5: recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000001c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x40096102, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/228) r1 = socket(0xa, 0x1, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl(r1, 0x8916, &(0x7f0000000000)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) ioctl(r1, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000440)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f00000004c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000240), r3, 0x1}}, 0x18) fremovexattr(r2, &(0x7f0000000140)=@known='trusted.overlay.metacopy\x00') 11:57:07 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) [ 183.832662] QAT: failed to copy from user cfg_data. 11:57:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, 0x0, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 183.857622] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 183.876954] QAT: Invalid ioctl [ 183.896498] EXT4-fs (loop0): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 11:57:08 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:08 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) [ 183.921929] QAT: failed to copy from user cfg_data. [ 183.935486] QAT: Invalid ioctl 11:57:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) recvfrom(r3, &(0x7f00000001c0)=""/158, 0x9e, 0x40, &(0x7f0000000000)=@ethernet={0x6, @local}, 0x80) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000000700)=[{{&(0x7f00000003c0)=@ethernet={0x0, @random}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000440)=""/50, 0x32}, {&(0x7f0000000480)=""/177, 0xb1}, {&(0x7f0000000540)=""/119, 0x77}], 0x3, &(0x7f0000000600)=""/196, 0xc4}, 0xffffff00}], 0x1, 0x100, &(0x7f0000000740)) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = dup(r0) ioctl$MON_IOCX_GETX(r5, 0x4018920a, &(0x7f0000000380)={&(0x7f0000000140), &(0x7f0000000280)=""/216, 0xfffffffffffffe93}) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="030400306c00600000000000fff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x306c, 0x4000002, 0x0, 0x2ff) 11:57:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, 0x0) 11:57:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 184.107495] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 184.121101] EXT4-fs (loop0): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 11:57:08 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) 11:57:08 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0x2, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 184.415501] QAT: failed to copy from user cfg_data. [ 184.422634] QAT: Invalid ioctl 11:57:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)) 11:57:08 executing program 4: unshare(0x0) r0 = open(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0x0) getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/134, 0x86}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000058c0)=[{&(0x7f0000005840)=""/47, 0x2f}], 0x1}}], 0x4, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = socket$inet6(0xa, 0x1000000000002, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000140)=@filter={'filter\x00', 0xe, 0x4, 0x1120, [0x0, 0x20000900, 0x20000930, 0x200015fc], 0x0, &(0x7f0000000040), &(0x7f0000000900)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x385fbe7fc599a88b, 0x8, 0xeda2, 'veth0_to_bond\x00', 'bpq0\x00', 'gretap0\x00', 'lapb0\x00', @local, [0xff, 0xd0af36dee52ca3ee, 0xff, 0x0, 0x0, 0xff], @remote, [0x0, 0x1fe, 0x0, 0x0, 0xff], 0xa8e, 0xaee, 0xb66, [@bpf0={'bpf\x00', 0x210, {{0xa, [{0x6, 0x4, 0x7f, 0x3}, {0x5, 0x3f, 0x4, 0x7}, {0x3, 0xc7, 0x5, 0x800}, {0x1, 0x4c, 0x4, 0x101}, {0x20, 0x5, 0x40}, {0x7, 0x7, 0x1, 0x1}, {0x7, 0x6, 0x48, 0xffffffff}, {0x200, 0x0, 0x7, 0x6}, {0x3, 0x4, 0x0, 0x2}, {0x9, 0x80, 0x5, 0x40}, {0x0, 0x1f, 0x3, 0x1f}, {0x1, 0x1, 0xf9, 0x5}, {0x9, 0x8, 0x8, 0x8}, {0x0, 0xf6, 0x3, 0x7}, {0x3, 0xe7, 0x2, 0x800}, {0xae, 0x9, 0x1f, 0x82b}, {0x200, 0x3f, 0x1, 0x4}, {0x1000, 0x5, 0x86, 0x5}, {0x1ff, 0x9, 0x12, 0x1}, {0x5, 0x11, 0x3, 0xfffffffb}, {0x1, 0x5, 0x0, 0x10001}, {0xfffb, 0xf8, 0x1, 0x1000}, {0x7, 0x0, 0xff, 0xff}, {0x8, 0xff, 0x20, 0x1}, {0x0, 0x3f, 0x1, 0x400}, {0x0, 0x7, 0x2, 0x7}, {0x7, 0x6, 0x40, 0xffffffff}, {0x0, 0x9, 0xfa, 0x1}, {0x2b, 0x5, 0x98, 0x3}, {0x1ff, 0x8, 0xc1}, {0x2, 0x5f, 0xe0}, {0x5, 0x9, 0x8, 0x3}, {0x6, 0xff, 0x4, 0xfffffff9}, {0x7f, 0x3, 0x6, 0x8}, {0x7, 0x3, 0x7f}, {0x9, 0x81, 0x3, 0x6}, {0x9, 0x8, 0x20, 0x8}, {0x1, 0x9, 0x47, 0xcff}, {0xae3c, 0xff, 0xe0, 0x101}, {0xd97a, 0x1, 0x1, 0x3}, {0x5, 0x9, 0x6, 0x7fffffff}, {0x400, 0x0, 0x8, 0x6}, {0x0, 0x20, 0xb8, 0x716}, {0x1, 0x7f, 0x6, 0x2}, {0x80, 0x3f, 0xff, 0x249}, {0x7f, 0x7, 0x11, 0x800}, {0x800, 0x6, 0xe0, 0x401}, {0x5, 0x2, 0x9d, 0x75c3}, {0x800, 0x8, 0x4, 0xd666}, {0xc3ee, 0xe8, 0x3, 0x3f}, {0x4, 0x3, 0x32, 0xffff}, {0x1, 0x1, 0x1}, {0xead7, 0x2, 0x3, 0xfffffffc}, {0x5, 0xe3, 0x0, 0x89ee}, {0x5, 0x27, 0x1, 0x5}, {0x200, 0x9, 0x7, 0x4}, {0x0, 0x8, 0x20, 0xe9}, {0x6, 0x9, 0x45, 0x9}, {0x3ff, 0x5, 0x6, 0x8001}, {0x4, 0x5, 0x8, 0x40}, {0xfffb, 0x2, 0x40, 0x76}, {0xfffe, 0x8, 0x93, 0x400}, {0x3ff, 0xed, 0x80, 0x1}, {0x1, 0x7, 0x0, 0x1}], 0x1}}}, @u32={'u32\x00', 0x7c0, {{[{[{0x4, 0x3}, {0x1}, {0x80, 0xfcb9806de382b702}, {0x8001}, {0x20}, {0x5}, {0x10001, 0x4}, {0x5}, {0x60}, {0x1, 0x1}, {0x8, 0x3}], [{0xca5c, 0x3}, {0x9, 0x8}, {0xff, 0x7}, {0x0, 0x9}, {0xee, 0x3}, {0x10000, 0xb594}, {0x7fffffff, 0x5}, {0x20, 0x1fc0000}, {0xfff, 0x1}, {0x0, 0x1000}, {0x3, 0x64}], 0x0, 0x2}, {[{0xff, 0x3}, {0x9, 0x2}, {0x200, 0x1}, {0x94bd, 0x2}, {0x3, 0x2}, {0x4, 0x2}, {0x80000001, 0x1}, {0x6, 0x1}, {0x741, 0x3}, {0x7dd, 0x3}, {0x7fff, 0x1}], [{0x200, 0x3}, {0x7, 0x1}, {0x7943, 0x20}, {0x2, 0x3}, {0x7, 0x2}, {0x910, 0x200}, {0x2}, {0x9, 0x3}, {0x3, 0x8000000}, {0x1, 0x3}, {0x7fff, 0xffffffff}], 0x2, 0x8}, {[{0x20, 0x7}, {0x5, 0x2}, {0x1, 0x1}, {0x8, 0x3}, {0xec3, 0x3}, {0x3}, {0x0, 0x3}, {0x1, 0x1}, {0x2, 0x2}, {0x6}, {0x7, 0x5}], [{0x1, 0x4}, {0x7, 0xffffffff}, {0x80000000, 0x2}, {0x7, 0xa}, {0x0, 0x7}, {0x8, 0x8}, {0x2c00, 0xffffffff}, {0x8, 0x401}, {0x3f, 0x7}, {0x20, 0x7f}, {0x101, 0x8}], 0x1, 0xb}, {[{0x60a8000, 0x2}, {0x200, 0x3}, {0x3, 0x3}, {0x5}, {0x33, 0x2}, {0x0, 0x2}, {0x9}, {0x800, 0x1c3a1a593384cced}, {0x2}, {0x8000, 0x1}, {0x1}], [{0x9, 0x2}, {0x8, 0x1000}, {0x18000, 0x8000}, {0x1000, 0xffffffff}, {0x512a, 0x8}, {0x4, 0x1}, {0x4, 0xff}, {0x5, 0x6}, {0x0, 0x40}, {0xc99, 0x80}, {0x7f, 0x4}], 0x6, 0x3}, {[{0x7, 0x1}, {0xfffffffb, 0x2}, {0x2, 0x2}, {0x80000001}, {0xffffffff, 0x3}, {0x6, 0x3}, {0x9}, {0x828f}, {0x1, 0x3}, {0x3, 0x3}, {0x10001}], [{0x1, 0x7fff}, {0x8, 0x5}, {0x7, 0x6}, {0x4, 0x71e}, {0x800, 0xfff}, {0x81, 0x4}, {0x1, 0x80}, {0x0, 0x1730}, {0x18a2, 0x1}, {0xa0, 0xfffff800}, {0x3f, 0x9}], 0x1, 0xa}, {[{0xffff, 0x2}, {0x8}, {0x3, 0x3}, {0x4, 0x4cd3ef74e2c76216}, {0x2}, {0x7}, {0x8, 0x2}, {0x7}, {0x1000, 0x6}, {0x2, 0xe9a82b0f06438d60}, {0xe783, 0x2}], [{0x5, 0x80000001}, {0xb9b, 0x3}, {0x80000000, 0x20}, {0x93b, 0x67e}, {0x3, 0x2}, {0x3, 0x1}, {0x9, 0x8}, {0x6, 0x2}, {0x4f4a, 0x80000000}, {0x9, 0x2}, {0x400, 0x1f}], 0x0, 0xb}, {[{0xfff, 0x1}, {0x9, 0x1}, {0x100, 0x2}, {0x2, 0xa1ef761ac145ffdc}, {0x4, 0x3}, {0x3c, 0x5}, {0x6, 0x3}, {0x3}, {0x9, 0x1}, {0x9, 0x9b5ea68fdab3354d}, {0x1, 0x1}], [{0x0, 0x5}, {0x8, 0x4452}, {0x1, 0xf00}, {0x1, 0x3}, {0x1, 0x1ff}, {0x8, 0xfff}, {0x5, 0xfffffffc}, {0x1f, 0x100}, {0xc1e}, {0x7, 0x81}, {0xfffeffff, 0x40}], 0x2, 0x7}, {[{0x2, 0x2}, {0x3, 0x1}, {0x1ff, 0x3}, {0x1, 0x1}, {0x8, 0x1}, {0x2, 0x1}, {0x6}, {0x9}, {0x3}, {0x6, 0x1}, {0x1000, 0x3}], [{0x10000, 0x9}, {0x2, 0x81bb}, {0x4, 0x100}, {0x963, 0x3}, {0xd3f7, 0xba}, {0x8, 0x1}, {0x5, 0x2}, {0x5, 0x200}, {0x85b, 0x4}, {0x9, 0xfffffff8}, {0xf9, 0x5}], 0x1}, {[{0xfffffff9}, {0xd84e, 0x517540b9c2c66e9e}, {0xfffffffe, 0x2}, {0xfffffe00, 0x3}, {0x9, 0x3}, {0x4}, {0x7fff, 0x1}, {0x12000}, {0x0, 0xc08d08b27968aa44}, {0x40, 0x1}, {0x5, 0x1}], [{0xfffffbff, 0x3957}, {0x3, 0x4}, {0x6, 0x3}, {0x34, 0x8}, {0xabd2, 0xfffffff7}, {0x1, 0x8000}, {0x80, 0x2}, {0x6, 0x677f}, {0x7ff, 0x5}, {0xa00a, 0x6}, {0xffff, 0x745}], 0x3, 0x7}, {[{0x0, 0x3}, {0xfffffffe, 0x3}, {0x7}, {0x9}, {0x80000001, 0x3}, {0x8, 0x1}, {0x80, 0x3}, {0x7, 0x3}, {0x7}, {0xa15}, {0x6, 0x1}], [{0x10001, 0x4}, {0x4, 0x5}, {0x4, 0x1}, {0xfff, 0x1000}, {0xff, 0xff}, {0x9, 0x4}, {0x10000}, {0x8, 0x5}, {0xffffff81, 0x2000}, {0x0, 0x7}, {0x200, 0xc9}], 0x8, 0x6}, {[{0x8}, {0x9, 0x3}, {0x1, 0x1}, {0x6, 0x1}, {0x200}, {0x8, 0x1}, {0x741fe56}, {0x8f54a65, 0x2}, {0xfff, 0x5c9f2ebe736f13dc}, {0x4}, {0x101}], [{0x4, 0x9}, {0x68fb000, 0x82}, {0x5, 0x3cf}, {0x20, 0x1}, {0x0, 0x2}, {0x1, 0x5}, {0xfff, 0x6}, {0x5, 0x81}, {0x0, 0x39}, {0x4800, 0xa9b}, {0x2, 0x883a}], 0xa}], 0x3}}}], [@common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x6}}}], @common=@NFLOG={'NFLOG\x00', 0x50, {{0x9, 0x61a, 0x1, 0x0, 0x0, "bb6de646a0e4aaa0e7b2e0105649bf1440ac55fa0a1a6b18cae03c6bb0b3911b8c353c3df2d3f8a309e8487f9a6c3c4883395384a4c1b9cc139a321c0353461c"}}}}, {0x3, 0x12, 0xa01, 'ip6tnl0\x00', 'syzkaller0\x00', 'rose0\x00', 'gretap0\x00', @remote, [0xff, 0x0, 0x0, 0xff, 0x1fe], @empty, [0x849daa37bc745966, 0x101, 0xff, 0x1fe], 0xce, 0xfe, 0x136, [@cpu={'cpu\x00', 0x8, {{0x3, 0x1}}}, @m802_3={'802_3\x00', 0x8, {{0xe, 0x7, 0x1}}}], [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}], @common=@dnat={'dnat\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{0x3, 0x8, 0xf7, 'hwsim0\x00', 'bcsf0\x00', 'lo\x00', 'rose0\x00', @empty, [0x0, 0xff, 0xff, 0xff, 0x1fe, 0xff], @empty, [0x0, 0xff, 0xff, 0x0, 0x0, 0x80], 0xa6, 0x12e, 0x166, [@cluster={'cluster\x00', 0x10, {{0x3f, 0x0, 0x81, 0x1}}}], [@common=@dnat={'dnat\x00', 0x10, {{@dev={[], 0x1b}, 0xfffffffffffffffe}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x1, 'syz0\x00', 0x1f}}}], @common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{0x11, 0x62, 0x22eb, 'eql\x00', 'netdevsim0\x00', 'caif0\x00', 'vxcan1\x00', @remote, [0x0, 0x41e345f7751f121f, 0xff, 0xff, 0x7f, 0x80], @dev={[], 0xd}, [0xff, 0x0, 0xff, 0xff, 0x0, 0x17e], 0xbe, 0x226, 0x25e, [@helper={'helper\x00', 0x28, {{0x0, 'sane-20000\x00'}}}], [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x40, 'system_u:object_r:devicekit_power_exec_t:s0\x00'}}}, @common=@dnat={'dnat\x00', 0x10, {{@random="aacacc45e6bd", 0xfffffffffffffffd}}}], @common=@mark={'mark\x00', 0x10, {{0xfffffff0, 0xffffffffffffffff}}}}]}]}, 0x1198) connect(0xffffffffffffffff, &(0x7f00000004c0)=@in={0x2, 0x4e20, @loopback}, 0x80) r5 = dup2(r3, r1) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) r6 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7ff, 0x246141) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r7, 0x40096102, 0x0) ioctl$IMCTRLREQ(r7, 0x80044945, &(0x7f0000000540)={0x4002, 0x1f, 0x4, 0x5}) write$RDMA_USER_CM_CMD_BIND(r6, &(0x7f0000000400)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x22}}}, 0x90) sendmsg$netlink(r5, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000008c0)=ANY=[@ANYPTR=&(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES64=r6]]], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r1], 0x14}, 0x0) recvmmsg(r2, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) r8 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r8, 0xc0145608, &(0x7f0000000300)={0x0, 0x2, 0x2}) [ 184.497027] validate_nla: 10 callbacks suppressed [ 184.497039] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 11:57:08 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 184.537588] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem [ 184.563418] EXT4-fs (loop0): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 11:57:08 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) 11:57:08 executing program 5: socket$inet6(0xa, 0x100000003, 0x3a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ftruncate(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1000, 0x200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000480)={0x3c, r4, 0x31, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}]}, 0x3c}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x40, r4, 0x800, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3f}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xac40}]}, 0x40}, 0x1, 0x0, 0x0, 0x5}, 0x4) listen(r1, 0x0) sendto$inet6(r1, &(0x7f0000000140)="3c9bcee7c949ada00010230ca4345ea92440674368992801ec81670ab1d77b9c688b4d18ecc540ad3927149801213a1c71b3886430fc1a815641b9175e3ef7e3da10cc8c600361f32d3280e8135140e05a9f764f8e855534c8eb8774d1c80d56ac087a529cb0bcd1480dc080de123dcbf6153d8dae7b0d95964ee6122539b719ac27ecb5570c4e81d7d10bf20488e034", 0x90, 0x40000012, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x30, r4, 0x1400, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x4440}, 0x0) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r5, 0x40096102, 0x0) write$char_usb(r5, &(0x7f0000000000)="621b9a0bd201cd0cce641d34608fe922fedd874ef2bedabc78eecfd3bd728f613166be67d2d6b3e08b7fbd966787679e2d2a8eec7e40ec82ad41443d662dee3c6a75e8b3127381e4", 0x48) [ 184.711596] QAT: failed to copy from user cfg_data. 11:57:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, 0x0, 0x0) 11:57:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)) [ 184.747233] QAT: Invalid ioctl [ 184.757016] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 11:57:08 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x4, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 184.817933] IPVS: sync thread started: state = MASTER, mcast_ifn = lo, syncid = 0, id = 0 11:57:08 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) [ 184.877788] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 11:57:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, 0x0, 0x0) 11:57:09 executing program 5: creat(&(0x7f0000000080)='./bus\x00', 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000240)='./bus\x00', &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='./bus\x00') acct(&(0x7f0000000000)='./bus\x00') [ 184.974110] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 184.994531] EXT4-fs (loop0): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 11:57:09 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0xf, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 185.406840] Process accounting resumed 11:57:09 executing program 4: unshare(0x0) r0 = open(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0x0) getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/134, 0x86}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000058c0)=[{&(0x7f0000005840)=""/47, 0x2f}], 0x1}}], 0x4, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = socket$inet6(0xa, 0x1000000000002, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000140)=@filter={'filter\x00', 0xe, 0x4, 0x1120, [0x0, 0x20000900, 0x20000930, 0x200015fc], 0x0, &(0x7f0000000040), &(0x7f0000000900)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x385fbe7fc599a88b, 0x8, 0xeda2, 'veth0_to_bond\x00', 'bpq0\x00', 'gretap0\x00', 'lapb0\x00', @local, [0xff, 0xd0af36dee52ca3ee, 0xff, 0x0, 0x0, 0xff], @remote, [0x0, 0x1fe, 0x0, 0x0, 0xff], 0xa8e, 0xaee, 0xb66, [@bpf0={'bpf\x00', 0x210, {{0xa, [{0x6, 0x4, 0x7f, 0x3}, {0x5, 0x3f, 0x4, 0x7}, {0x3, 0xc7, 0x5, 0x800}, {0x1, 0x4c, 0x4, 0x101}, {0x20, 0x5, 0x40}, {0x7, 0x7, 0x1, 0x1}, {0x7, 0x6, 0x48, 0xffffffff}, {0x200, 0x0, 0x7, 0x6}, {0x3, 0x4, 0x0, 0x2}, {0x9, 0x80, 0x5, 0x40}, {0x0, 0x1f, 0x3, 0x1f}, {0x1, 0x1, 0xf9, 0x5}, {0x9, 0x8, 0x8, 0x8}, {0x0, 0xf6, 0x3, 0x7}, {0x3, 0xe7, 0x2, 0x800}, {0xae, 0x9, 0x1f, 0x82b}, {0x200, 0x3f, 0x1, 0x4}, {0x1000, 0x5, 0x86, 0x5}, {0x1ff, 0x9, 0x12, 0x1}, {0x5, 0x11, 0x3, 0xfffffffb}, {0x1, 0x5, 0x0, 0x10001}, {0xfffb, 0xf8, 0x1, 0x1000}, {0x7, 0x0, 0xff, 0xff}, {0x8, 0xff, 0x20, 0x1}, {0x0, 0x3f, 0x1, 0x400}, {0x0, 0x7, 0x2, 0x7}, {0x7, 0x6, 0x40, 0xffffffff}, {0x0, 0x9, 0xfa, 0x1}, {0x2b, 0x5, 0x98, 0x3}, {0x1ff, 0x8, 0xc1}, {0x2, 0x5f, 0xe0}, {0x5, 0x9, 0x8, 0x3}, {0x6, 0xff, 0x4, 0xfffffff9}, {0x7f, 0x3, 0x6, 0x8}, {0x7, 0x3, 0x7f}, {0x9, 0x81, 0x3, 0x6}, {0x9, 0x8, 0x20, 0x8}, {0x1, 0x9, 0x47, 0xcff}, {0xae3c, 0xff, 0xe0, 0x101}, {0xd97a, 0x1, 0x1, 0x3}, {0x5, 0x9, 0x6, 0x7fffffff}, {0x400, 0x0, 0x8, 0x6}, {0x0, 0x20, 0xb8, 0x716}, {0x1, 0x7f, 0x6, 0x2}, {0x80, 0x3f, 0xff, 0x249}, {0x7f, 0x7, 0x11, 0x800}, {0x800, 0x6, 0xe0, 0x401}, {0x5, 0x2, 0x9d, 0x75c3}, {0x800, 0x8, 0x4, 0xd666}, {0xc3ee, 0xe8, 0x3, 0x3f}, {0x4, 0x3, 0x32, 0xffff}, {0x1, 0x1, 0x1}, {0xead7, 0x2, 0x3, 0xfffffffc}, {0x5, 0xe3, 0x0, 0x89ee}, {0x5, 0x27, 0x1, 0x5}, {0x200, 0x9, 0x7, 0x4}, {0x0, 0x8, 0x20, 0xe9}, {0x6, 0x9, 0x45, 0x9}, {0x3ff, 0x5, 0x6, 0x8001}, {0x4, 0x5, 0x8, 0x40}, {0xfffb, 0x2, 0x40, 0x76}, {0xfffe, 0x8, 0x93, 0x400}, {0x3ff, 0xed, 0x80, 0x1}, {0x1, 0x7, 0x0, 0x1}], 0x1}}}, @u32={'u32\x00', 0x7c0, {{[{[{0x4, 0x3}, {0x1}, {0x80, 0xfcb9806de382b702}, {0x8001}, {0x20}, {0x5}, {0x10001, 0x4}, {0x5}, {0x60}, {0x1, 0x1}, {0x8, 0x3}], [{0xca5c, 0x3}, {0x9, 0x8}, {0xff, 0x7}, {0x0, 0x9}, {0xee, 0x3}, {0x10000, 0xb594}, {0x7fffffff, 0x5}, {0x20, 0x1fc0000}, {0xfff, 0x1}, {0x0, 0x1000}, {0x3, 0x64}], 0x0, 0x2}, {[{0xff, 0x3}, {0x9, 0x2}, {0x200, 0x1}, {0x94bd, 0x2}, {0x3, 0x2}, {0x4, 0x2}, {0x80000001, 0x1}, {0x6, 0x1}, {0x741, 0x3}, {0x7dd, 0x3}, {0x7fff, 0x1}], [{0x200, 0x3}, {0x7, 0x1}, {0x7943, 0x20}, {0x2, 0x3}, {0x7, 0x2}, {0x910, 0x200}, {0x2}, {0x9, 0x3}, {0x3, 0x8000000}, {0x1, 0x3}, {0x7fff, 0xffffffff}], 0x2, 0x8}, {[{0x20, 0x7}, {0x5, 0x2}, {0x1, 0x1}, {0x8, 0x3}, {0xec3, 0x3}, {0x3}, {0x0, 0x3}, {0x1, 0x1}, {0x2, 0x2}, {0x6}, {0x7, 0x5}], [{0x1, 0x4}, {0x7, 0xffffffff}, {0x80000000, 0x2}, {0x7, 0xa}, {0x0, 0x7}, {0x8, 0x8}, {0x2c00, 0xffffffff}, {0x8, 0x401}, {0x3f, 0x7}, {0x20, 0x7f}, {0x101, 0x8}], 0x1, 0xb}, {[{0x60a8000, 0x2}, {0x200, 0x3}, {0x3, 0x3}, {0x5}, {0x33, 0x2}, {0x0, 0x2}, {0x9}, {0x800, 0x1c3a1a593384cced}, {0x2}, {0x8000, 0x1}, {0x1}], [{0x9, 0x2}, {0x8, 0x1000}, {0x18000, 0x8000}, {0x1000, 0xffffffff}, {0x512a, 0x8}, {0x4, 0x1}, {0x4, 0xff}, {0x5, 0x6}, {0x0, 0x40}, {0xc99, 0x80}, {0x7f, 0x4}], 0x6, 0x3}, {[{0x7, 0x1}, {0xfffffffb, 0x2}, {0x2, 0x2}, {0x80000001}, {0xffffffff, 0x3}, {0x6, 0x3}, {0x9}, {0x828f}, {0x1, 0x3}, {0x3, 0x3}, {0x10001}], [{0x1, 0x7fff}, {0x8, 0x5}, {0x7, 0x6}, {0x4, 0x71e}, {0x800, 0xfff}, {0x81, 0x4}, {0x1, 0x80}, {0x0, 0x1730}, {0x18a2, 0x1}, {0xa0, 0xfffff800}, {0x3f, 0x9}], 0x1, 0xa}, {[{0xffff, 0x2}, {0x8}, {0x3, 0x3}, {0x4, 0x4cd3ef74e2c76216}, {0x2}, {0x7}, {0x8, 0x2}, {0x7}, {0x1000, 0x6}, {0x2, 0xe9a82b0f06438d60}, {0xe783, 0x2}], [{0x5, 0x80000001}, {0xb9b, 0x3}, {0x80000000, 0x20}, {0x93b, 0x67e}, {0x3, 0x2}, {0x3, 0x1}, {0x9, 0x8}, {0x6, 0x2}, {0x4f4a, 0x80000000}, {0x9, 0x2}, {0x400, 0x1f}], 0x0, 0xb}, {[{0xfff, 0x1}, {0x9, 0x1}, {0x100, 0x2}, {0x2, 0xa1ef761ac145ffdc}, {0x4, 0x3}, {0x3c, 0x5}, {0x6, 0x3}, {0x3}, {0x9, 0x1}, {0x9, 0x9b5ea68fdab3354d}, {0x1, 0x1}], [{0x0, 0x5}, {0x8, 0x4452}, {0x1, 0xf00}, {0x1, 0x3}, {0x1, 0x1ff}, {0x8, 0xfff}, {0x5, 0xfffffffc}, {0x1f, 0x100}, {0xc1e}, {0x7, 0x81}, {0xfffeffff, 0x40}], 0x2, 0x7}, {[{0x2, 0x2}, {0x3, 0x1}, {0x1ff, 0x3}, {0x1, 0x1}, {0x8, 0x1}, {0x2, 0x1}, {0x6}, {0x9}, {0x3}, {0x6, 0x1}, {0x1000, 0x3}], [{0x10000, 0x9}, {0x2, 0x81bb}, {0x4, 0x100}, {0x963, 0x3}, {0xd3f7, 0xba}, {0x8, 0x1}, {0x5, 0x2}, {0x5, 0x200}, {0x85b, 0x4}, {0x9, 0xfffffff8}, {0xf9, 0x5}], 0x1}, {[{0xfffffff9}, {0xd84e, 0x517540b9c2c66e9e}, {0xfffffffe, 0x2}, {0xfffffe00, 0x3}, {0x9, 0x3}, {0x4}, {0x7fff, 0x1}, {0x12000}, {0x0, 0xc08d08b27968aa44}, {0x40, 0x1}, {0x5, 0x1}], [{0xfffffbff, 0x3957}, {0x3, 0x4}, {0x6, 0x3}, {0x34, 0x8}, {0xabd2, 0xfffffff7}, {0x1, 0x8000}, {0x80, 0x2}, {0x6, 0x677f}, {0x7ff, 0x5}, {0xa00a, 0x6}, {0xffff, 0x745}], 0x3, 0x7}, {[{0x0, 0x3}, {0xfffffffe, 0x3}, {0x7}, {0x9}, {0x80000001, 0x3}, {0x8, 0x1}, {0x80, 0x3}, {0x7, 0x3}, {0x7}, {0xa15}, {0x6, 0x1}], [{0x10001, 0x4}, {0x4, 0x5}, {0x4, 0x1}, {0xfff, 0x1000}, {0xff, 0xff}, {0x9, 0x4}, {0x10000}, {0x8, 0x5}, {0xffffff81, 0x2000}, {0x0, 0x7}, {0x200, 0xc9}], 0x8, 0x6}, {[{0x8}, {0x9, 0x3}, {0x1, 0x1}, {0x6, 0x1}, {0x200}, {0x8, 0x1}, {0x741fe56}, {0x8f54a65, 0x2}, {0xfff, 0x5c9f2ebe736f13dc}, {0x4}, {0x101}], [{0x4, 0x9}, {0x68fb000, 0x82}, {0x5, 0x3cf}, {0x20, 0x1}, {0x0, 0x2}, {0x1, 0x5}, {0xfff, 0x6}, {0x5, 0x81}, {0x0, 0x39}, {0x4800, 0xa9b}, {0x2, 0x883a}], 0xa}], 0x3}}}], [@common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x6}}}], @common=@NFLOG={'NFLOG\x00', 0x50, {{0x9, 0x61a, 0x1, 0x0, 0x0, "bb6de646a0e4aaa0e7b2e0105649bf1440ac55fa0a1a6b18cae03c6bb0b3911b8c353c3df2d3f8a309e8487f9a6c3c4883395384a4c1b9cc139a321c0353461c"}}}}, {0x3, 0x12, 0xa01, 'ip6tnl0\x00', 'syzkaller0\x00', 'rose0\x00', 'gretap0\x00', @remote, [0xff, 0x0, 0x0, 0xff, 0x1fe], @empty, [0x849daa37bc745966, 0x101, 0xff, 0x1fe], 0xce, 0xfe, 0x136, [@cpu={'cpu\x00', 0x8, {{0x3, 0x1}}}, @m802_3={'802_3\x00', 0x8, {{0xe, 0x7, 0x1}}}], [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}], @common=@dnat={'dnat\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{0x3, 0x8, 0xf7, 'hwsim0\x00', 'bcsf0\x00', 'lo\x00', 'rose0\x00', @empty, [0x0, 0xff, 0xff, 0xff, 0x1fe, 0xff], @empty, [0x0, 0xff, 0xff, 0x0, 0x0, 0x80], 0xa6, 0x12e, 0x166, [@cluster={'cluster\x00', 0x10, {{0x3f, 0x0, 0x81, 0x1}}}], [@common=@dnat={'dnat\x00', 0x10, {{@dev={[], 0x1b}, 0xfffffffffffffffe}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x1, 'syz0\x00', 0x1f}}}], @common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{0x11, 0x62, 0x22eb, 'eql\x00', 'netdevsim0\x00', 'caif0\x00', 'vxcan1\x00', @remote, [0x0, 0x41e345f7751f121f, 0xff, 0xff, 0x7f, 0x80], @dev={[], 0xd}, [0xff, 0x0, 0xff, 0xff, 0x0, 0x17e], 0xbe, 0x226, 0x25e, [@helper={'helper\x00', 0x28, {{0x0, 'sane-20000\x00'}}}], [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x40, 'system_u:object_r:devicekit_power_exec_t:s0\x00'}}}, @common=@dnat={'dnat\x00', 0x10, {{@random="aacacc45e6bd", 0xfffffffffffffffd}}}], @common=@mark={'mark\x00', 0x10, {{0xfffffff0, 0xffffffffffffffff}}}}]}]}, 0x1198) connect(0xffffffffffffffff, &(0x7f00000004c0)=@in={0x2, 0x4e20, @loopback}, 0x80) r5 = dup2(r3, r1) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) r6 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7ff, 0x246141) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r7, 0x40096102, 0x0) ioctl$IMCTRLREQ(r7, 0x80044945, &(0x7f0000000540)={0x4002, 0x1f, 0x4, 0x5}) write$RDMA_USER_CM_CMD_BIND(r6, &(0x7f0000000400)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x22}}}, 0x90) sendmsg$netlink(r5, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000008c0)=ANY=[@ANYPTR=&(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES64=r6]]], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r1], 0x14}, 0x0) recvmmsg(r2, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) r8 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r8, 0xc0145608, &(0x7f0000000300)={0x0, 0x2, 0x2}) [ 185.437214] QAT: failed to copy from user cfg_data. [ 185.442654] QAT: Invalid ioctl [ 185.475335] Process accounting resumed 11:57:09 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x10, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:09 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) 11:57:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, 0x0, 0x0) 11:57:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)) 11:57:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000080)=0x883, 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000006100)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @remote, 0x7}, 0x1c, 0x0}}], 0x110, 0x0) r2 = socket$netlink(0x10, 0x3, 0x12) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f00000001c0)=@buf) [ 185.537180] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 185.565745] EXT4-fs (loop0): mounting ext2 file system using the ext4 subsystem 11:57:09 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x2f, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 185.614672] Dead loop on virtual device ip6_vti0, fix it urgently! [ 185.650340] EXT4-fs (loop0): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 11:57:09 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) [ 185.680432] audit: type=1400 audit(1571313429.759:49): avc: denied { create } for pid=8987 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_scsitransport_socket permissive=1 [ 185.710708] QAT: failed to copy from user cfg_data. [ 185.726535] QAT: Invalid ioctl 11:57:09 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x3e, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 185.777660] audit: type=1400 audit(1571313429.789:50): avc: denied { ioctl } for pid=8987 comm="syz-executor.5" path="socket:[31674]" dev="sockfs" ino=31674 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_scsitransport_socket permissive=1 [ 185.887863] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 185.913256] Dead loop on virtual device ip6_vti0, fix it urgently! 11:57:10 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0xd0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:10 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) [ 186.198693] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 11:57:10 executing program 4: unshare(0x0) r0 = open(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0x0) getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/134, 0x86}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000058c0)=[{&(0x7f0000005840)=""/47, 0x2f}], 0x1}}], 0x4, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = socket$inet6(0xa, 0x1000000000002, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000140)=@filter={'filter\x00', 0xe, 0x4, 0x1120, [0x0, 0x20000900, 0x20000930, 0x200015fc], 0x0, &(0x7f0000000040), &(0x7f0000000900)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x385fbe7fc599a88b, 0x8, 0xeda2, 'veth0_to_bond\x00', 'bpq0\x00', 'gretap0\x00', 'lapb0\x00', @local, [0xff, 0xd0af36dee52ca3ee, 0xff, 0x0, 0x0, 0xff], @remote, [0x0, 0x1fe, 0x0, 0x0, 0xff], 0xa8e, 0xaee, 0xb66, [@bpf0={'bpf\x00', 0x210, {{0xa, [{0x6, 0x4, 0x7f, 0x3}, {0x5, 0x3f, 0x4, 0x7}, {0x3, 0xc7, 0x5, 0x800}, {0x1, 0x4c, 0x4, 0x101}, {0x20, 0x5, 0x40}, {0x7, 0x7, 0x1, 0x1}, {0x7, 0x6, 0x48, 0xffffffff}, {0x200, 0x0, 0x7, 0x6}, {0x3, 0x4, 0x0, 0x2}, {0x9, 0x80, 0x5, 0x40}, {0x0, 0x1f, 0x3, 0x1f}, {0x1, 0x1, 0xf9, 0x5}, {0x9, 0x8, 0x8, 0x8}, {0x0, 0xf6, 0x3, 0x7}, {0x3, 0xe7, 0x2, 0x800}, {0xae, 0x9, 0x1f, 0x82b}, {0x200, 0x3f, 0x1, 0x4}, {0x1000, 0x5, 0x86, 0x5}, {0x1ff, 0x9, 0x12, 0x1}, {0x5, 0x11, 0x3, 0xfffffffb}, {0x1, 0x5, 0x0, 0x10001}, {0xfffb, 0xf8, 0x1, 0x1000}, {0x7, 0x0, 0xff, 0xff}, {0x8, 0xff, 0x20, 0x1}, {0x0, 0x3f, 0x1, 0x400}, {0x0, 0x7, 0x2, 0x7}, {0x7, 0x6, 0x40, 0xffffffff}, {0x0, 0x9, 0xfa, 0x1}, {0x2b, 0x5, 0x98, 0x3}, {0x1ff, 0x8, 0xc1}, {0x2, 0x5f, 0xe0}, {0x5, 0x9, 0x8, 0x3}, {0x6, 0xff, 0x4, 0xfffffff9}, {0x7f, 0x3, 0x6, 0x8}, {0x7, 0x3, 0x7f}, {0x9, 0x81, 0x3, 0x6}, {0x9, 0x8, 0x20, 0x8}, {0x1, 0x9, 0x47, 0xcff}, {0xae3c, 0xff, 0xe0, 0x101}, {0xd97a, 0x1, 0x1, 0x3}, {0x5, 0x9, 0x6, 0x7fffffff}, {0x400, 0x0, 0x8, 0x6}, {0x0, 0x20, 0xb8, 0x716}, {0x1, 0x7f, 0x6, 0x2}, {0x80, 0x3f, 0xff, 0x249}, {0x7f, 0x7, 0x11, 0x800}, {0x800, 0x6, 0xe0, 0x401}, {0x5, 0x2, 0x9d, 0x75c3}, {0x800, 0x8, 0x4, 0xd666}, {0xc3ee, 0xe8, 0x3, 0x3f}, {0x4, 0x3, 0x32, 0xffff}, {0x1, 0x1, 0x1}, {0xead7, 0x2, 0x3, 0xfffffffc}, {0x5, 0xe3, 0x0, 0x89ee}, {0x5, 0x27, 0x1, 0x5}, {0x200, 0x9, 0x7, 0x4}, {0x0, 0x8, 0x20, 0xe9}, {0x6, 0x9, 0x45, 0x9}, {0x3ff, 0x5, 0x6, 0x8001}, {0x4, 0x5, 0x8, 0x40}, {0xfffb, 0x2, 0x40, 0x76}, {0xfffe, 0x8, 0x93, 0x400}, {0x3ff, 0xed, 0x80, 0x1}, {0x1, 0x7, 0x0, 0x1}], 0x1}}}, @u32={'u32\x00', 0x7c0, {{[{[{0x4, 0x3}, {0x1}, {0x80, 0xfcb9806de382b702}, {0x8001}, {0x20}, {0x5}, {0x10001, 0x4}, {0x5}, {0x60}, {0x1, 0x1}, {0x8, 0x3}], [{0xca5c, 0x3}, {0x9, 0x8}, {0xff, 0x7}, {0x0, 0x9}, {0xee, 0x3}, {0x10000, 0xb594}, {0x7fffffff, 0x5}, {0x20, 0x1fc0000}, {0xfff, 0x1}, {0x0, 0x1000}, {0x3, 0x64}], 0x0, 0x2}, {[{0xff, 0x3}, {0x9, 0x2}, {0x200, 0x1}, {0x94bd, 0x2}, {0x3, 0x2}, {0x4, 0x2}, {0x80000001, 0x1}, {0x6, 0x1}, {0x741, 0x3}, {0x7dd, 0x3}, {0x7fff, 0x1}], [{0x200, 0x3}, {0x7, 0x1}, {0x7943, 0x20}, {0x2, 0x3}, {0x7, 0x2}, {0x910, 0x200}, {0x2}, {0x9, 0x3}, {0x3, 0x8000000}, {0x1, 0x3}, {0x7fff, 0xffffffff}], 0x2, 0x8}, {[{0x20, 0x7}, {0x5, 0x2}, {0x1, 0x1}, {0x8, 0x3}, {0xec3, 0x3}, {0x3}, {0x0, 0x3}, {0x1, 0x1}, {0x2, 0x2}, {0x6}, {0x7, 0x5}], [{0x1, 0x4}, {0x7, 0xffffffff}, {0x80000000, 0x2}, {0x7, 0xa}, {0x0, 0x7}, {0x8, 0x8}, {0x2c00, 0xffffffff}, {0x8, 0x401}, {0x3f, 0x7}, {0x20, 0x7f}, {0x101, 0x8}], 0x1, 0xb}, {[{0x60a8000, 0x2}, {0x200, 0x3}, {0x3, 0x3}, {0x5}, {0x33, 0x2}, {0x0, 0x2}, {0x9}, {0x800, 0x1c3a1a593384cced}, {0x2}, {0x8000, 0x1}, {0x1}], [{0x9, 0x2}, {0x8, 0x1000}, {0x18000, 0x8000}, {0x1000, 0xffffffff}, {0x512a, 0x8}, {0x4, 0x1}, {0x4, 0xff}, {0x5, 0x6}, {0x0, 0x40}, {0xc99, 0x80}, {0x7f, 0x4}], 0x6, 0x3}, {[{0x7, 0x1}, {0xfffffffb, 0x2}, {0x2, 0x2}, {0x80000001}, {0xffffffff, 0x3}, {0x6, 0x3}, {0x9}, {0x828f}, {0x1, 0x3}, {0x3, 0x3}, {0x10001}], [{0x1, 0x7fff}, {0x8, 0x5}, {0x7, 0x6}, {0x4, 0x71e}, {0x800, 0xfff}, {0x81, 0x4}, {0x1, 0x80}, {0x0, 0x1730}, {0x18a2, 0x1}, {0xa0, 0xfffff800}, {0x3f, 0x9}], 0x1, 0xa}, {[{0xffff, 0x2}, {0x8}, {0x3, 0x3}, {0x4, 0x4cd3ef74e2c76216}, {0x2}, {0x7}, {0x8, 0x2}, {0x7}, {0x1000, 0x6}, {0x2, 0xe9a82b0f06438d60}, {0xe783, 0x2}], [{0x5, 0x80000001}, {0xb9b, 0x3}, {0x80000000, 0x20}, {0x93b, 0x67e}, {0x3, 0x2}, {0x3, 0x1}, {0x9, 0x8}, {0x6, 0x2}, {0x4f4a, 0x80000000}, {0x9, 0x2}, {0x400, 0x1f}], 0x0, 0xb}, {[{0xfff, 0x1}, {0x9, 0x1}, {0x100, 0x2}, {0x2, 0xa1ef761ac145ffdc}, {0x4, 0x3}, {0x3c, 0x5}, {0x6, 0x3}, {0x3}, {0x9, 0x1}, {0x9, 0x9b5ea68fdab3354d}, {0x1, 0x1}], [{0x0, 0x5}, {0x8, 0x4452}, {0x1, 0xf00}, {0x1, 0x3}, {0x1, 0x1ff}, {0x8, 0xfff}, {0x5, 0xfffffffc}, {0x1f, 0x100}, {0xc1e}, {0x7, 0x81}, {0xfffeffff, 0x40}], 0x2, 0x7}, {[{0x2, 0x2}, {0x3, 0x1}, {0x1ff, 0x3}, {0x1, 0x1}, {0x8, 0x1}, {0x2, 0x1}, {0x6}, {0x9}, {0x3}, {0x6, 0x1}, {0x1000, 0x3}], [{0x10000, 0x9}, {0x2, 0x81bb}, {0x4, 0x100}, {0x963, 0x3}, {0xd3f7, 0xba}, {0x8, 0x1}, {0x5, 0x2}, {0x5, 0x200}, {0x85b, 0x4}, {0x9, 0xfffffff8}, {0xf9, 0x5}], 0x1}, {[{0xfffffff9}, {0xd84e, 0x517540b9c2c66e9e}, {0xfffffffe, 0x2}, {0xfffffe00, 0x3}, {0x9, 0x3}, {0x4}, {0x7fff, 0x1}, {0x12000}, {0x0, 0xc08d08b27968aa44}, {0x40, 0x1}, {0x5, 0x1}], [{0xfffffbff, 0x3957}, {0x3, 0x4}, {0x6, 0x3}, {0x34, 0x8}, {0xabd2, 0xfffffff7}, {0x1, 0x8000}, {0x80, 0x2}, {0x6, 0x677f}, {0x7ff, 0x5}, {0xa00a, 0x6}, {0xffff, 0x745}], 0x3, 0x7}, {[{0x0, 0x3}, {0xfffffffe, 0x3}, {0x7}, {0x9}, {0x80000001, 0x3}, {0x8, 0x1}, {0x80, 0x3}, {0x7, 0x3}, {0x7}, {0xa15}, {0x6, 0x1}], [{0x10001, 0x4}, {0x4, 0x5}, {0x4, 0x1}, {0xfff, 0x1000}, {0xff, 0xff}, {0x9, 0x4}, {0x10000}, {0x8, 0x5}, {0xffffff81, 0x2000}, {0x0, 0x7}, {0x200, 0xc9}], 0x8, 0x6}, {[{0x8}, {0x9, 0x3}, {0x1, 0x1}, {0x6, 0x1}, {0x200}, {0x8, 0x1}, {0x741fe56}, {0x8f54a65, 0x2}, {0xfff, 0x5c9f2ebe736f13dc}, {0x4}, {0x101}], [{0x4, 0x9}, {0x68fb000, 0x82}, {0x5, 0x3cf}, {0x20, 0x1}, {0x0, 0x2}, {0x1, 0x5}, {0xfff, 0x6}, {0x5, 0x81}, {0x0, 0x39}, {0x4800, 0xa9b}, {0x2, 0x883a}], 0xa}], 0x3}}}], [@common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x6}}}], @common=@NFLOG={'NFLOG\x00', 0x50, {{0x9, 0x61a, 0x1, 0x0, 0x0, "bb6de646a0e4aaa0e7b2e0105649bf1440ac55fa0a1a6b18cae03c6bb0b3911b8c353c3df2d3f8a309e8487f9a6c3c4883395384a4c1b9cc139a321c0353461c"}}}}, {0x3, 0x12, 0xa01, 'ip6tnl0\x00', 'syzkaller0\x00', 'rose0\x00', 'gretap0\x00', @remote, [0xff, 0x0, 0x0, 0xff, 0x1fe], @empty, [0x849daa37bc745966, 0x101, 0xff, 0x1fe], 0xce, 0xfe, 0x136, [@cpu={'cpu\x00', 0x8, {{0x3, 0x1}}}, @m802_3={'802_3\x00', 0x8, {{0xe, 0x7, 0x1}}}], [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}], @common=@dnat={'dnat\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{0x3, 0x8, 0xf7, 'hwsim0\x00', 'bcsf0\x00', 'lo\x00', 'rose0\x00', @empty, [0x0, 0xff, 0xff, 0xff, 0x1fe, 0xff], @empty, [0x0, 0xff, 0xff, 0x0, 0x0, 0x80], 0xa6, 0x12e, 0x166, [@cluster={'cluster\x00', 0x10, {{0x3f, 0x0, 0x81, 0x1}}}], [@common=@dnat={'dnat\x00', 0x10, {{@dev={[], 0x1b}, 0xfffffffffffffffe}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x1, 'syz0\x00', 0x1f}}}], @common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{0x11, 0x62, 0x22eb, 'eql\x00', 'netdevsim0\x00', 'caif0\x00', 'vxcan1\x00', @remote, [0x0, 0x41e345f7751f121f, 0xff, 0xff, 0x7f, 0x80], @dev={[], 0xd}, [0xff, 0x0, 0xff, 0xff, 0x0, 0x17e], 0xbe, 0x226, 0x25e, [@helper={'helper\x00', 0x28, {{0x0, 'sane-20000\x00'}}}], [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x40, 'system_u:object_r:devicekit_power_exec_t:s0\x00'}}}, @common=@dnat={'dnat\x00', 0x10, {{@random="aacacc45e6bd", 0xfffffffffffffffd}}}], @common=@mark={'mark\x00', 0x10, {{0xfffffff0, 0xffffffffffffffff}}}}]}]}, 0x1198) connect(0xffffffffffffffff, &(0x7f00000004c0)=@in={0x2, 0x4e20, @loopback}, 0x80) r5 = dup2(r3, r1) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) r6 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7ff, 0x246141) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r7, 0x40096102, 0x0) ioctl$IMCTRLREQ(r7, 0x80044945, &(0x7f0000000540)={0x4002, 0x1f, 0x4, 0x5}) write$RDMA_USER_CM_CMD_BIND(r6, &(0x7f0000000400)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e21, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x22}}}, 0x90) sendmsg$netlink(r5, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000008c0)=ANY=[@ANYPTR=&(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES64=r6]]], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r1], 0x14}, 0x0) recvmmsg(r2, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) r8 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r8, 0xc0145608, &(0x7f0000000300)={0x0, 0x2, 0x2}) 11:57:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 11:57:10 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0xfc, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:10 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@discard_size={'discard'}}]}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) lsetxattr$security_evm(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='security.evm\x00', &(0x7f0000000300)=@v1={0x2, "6e2659fbd85a926a24c56cb1aa1abb393dac"}, 0x13, 0x0) recvfrom(r1, &(0x7f0000000340)=""/190, 0xbe, 0x40, &(0x7f00000000c0)=@l2={0x1f, 0x5b6e, {0x0, 0x80, 0x0, 0x1, 0x9, 0x8}, 0xfcf, 0x9}, 0xa9) 11:57:10 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:57:10 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) [ 186.413783] FAULT_INJECTION: forcing a failure. [ 186.413783] name failslab, interval 1, probability 0, space 0, times 0 [ 186.431981] CPU: 0 PID: 9029 Comm: syz-executor.0 Not tainted 4.19.79 #0 [ 186.438935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.448572] Call Trace: [ 186.451284] dump_stack+0x172/0x1f0 [ 186.451308] should_fail.cold+0xa/0x1b [ 186.458861] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 186.463614] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 186.464101] ? lock_downgrade+0x880/0x880 [ 186.464130] __should_failslab+0x121/0x190 [ 186.480138] should_failslab+0x9/0x14 [ 186.480154] __kmalloc+0x2e2/0x750 [ 186.480168] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 186.480185] ? fput+0x128/0x1a0 [ 186.480197] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 186.480211] ? strnlen_user+0x15f/0x1e0 [ 186.480224] ? __x64_sys_memfd_create+0x13c/0x470 11:57:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 11:57:10 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0xf00, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 186.480241] __x64_sys_memfd_create+0x13c/0x470 [ 186.480255] ? memfd_fcntl+0x1a50/0x1a50 [ 186.480268] ? do_syscall_64+0x26/0x620 [ 186.480287] ? lockdep_hardirqs_on+0x415/0x5d0 [ 186.511270] QAT: failed to copy from user cfg_data. [ 186.511367] ? trace_hardirqs_on+0x67/0x220 [ 186.539826] do_syscall_64+0xfd/0x620 [ 186.543817] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.549034] RIP: 0033:0x459a59 [ 186.549048] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.549060] RSP: 002b:00007f724d58aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 186.549077] RAX: ffffffffffffffda RBX: 0000000020000340 RCX: 0000000000459a59 [ 186.549084] RDX: 0000000020000368 RSI: 0000000000000000 RDI: 00000000004be9b7 [ 186.549090] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 186.549097] R10: 0000000000000400 R11: 0000000000000246 R12: 00007f724d58b6d4 [ 186.549104] R13: 00000000004c8e36 R14: 00000000004e03d0 R15: 0000000000000003 [ 186.552935] JFS: discard option not supported on device [ 186.601390] QAT: Invalid ioctl 11:57:10 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) 11:57:10 executing program 1 (fault-call:4 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:10 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:57:10 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x2f00, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 186.794488] FAULT_INJECTION: forcing a failure. [ 186.794488] name failslab, interval 1, probability 0, space 0, times 0 [ 186.814260] FAULT_INJECTION: forcing a failure. [ 186.814260] name failslab, interval 1, probability 0, space 0, times 0 [ 186.839651] CPU: 1 PID: 9062 Comm: syz-executor.0 Not tainted 4.19.79 #0 [ 186.846955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.850024] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 186.856333] Call Trace: [ 186.856366] dump_stack+0x172/0x1f0 [ 186.856385] should_fail.cold+0xa/0x1b [ 186.856402] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 186.856428] ? lock_downgrade+0x880/0x880 [ 186.892263] __should_failslab+0x121/0x190 [ 186.896526] should_failslab+0x9/0x14 [ 186.900450] kmem_cache_alloc+0x2ae/0x700 [ 186.904615] ? __alloc_fd+0x44d/0x560 [ 186.908558] ? shmem_destroy_callback+0xc0/0xc0 [ 186.914289] shmem_alloc_inode+0x1c/0x50 [ 186.919428] alloc_inode+0x64/0x190 [ 186.924527] new_inode_pseudo+0x19/0xf0 [ 186.930162] new_inode+0x1f/0x40 [ 186.937846] shmem_get_inode+0x84/0x780 [ 186.941943] __shmem_file_setup.part.0+0x7e/0x2b0 [ 186.947263] shmem_file_setup+0x66/0x90 [ 186.952989] __x64_sys_memfd_create+0x2a2/0x470 [ 186.958129] ? memfd_fcntl+0x1a50/0x1a50 [ 186.962785] ? do_syscall_64+0x26/0x620 [ 186.967036] ? lockdep_hardirqs_on+0x415/0x5d0 [ 186.972053] ? trace_hardirqs_on+0x67/0x220 [ 186.979082] do_syscall_64+0xfd/0x620 [ 186.983104] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.992233] RIP: 0033:0x459a59 [ 186.996829] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.021250] RSP: 002b:00007f724d58aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 187.032827] RAX: ffffffffffffffda RBX: 0000000020000340 RCX: 0000000000459a59 [ 187.044210] RDX: 0000000020000368 RSI: 0000000000000000 RDI: 00000000004be9b7 [ 187.054786] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 187.065276] R10: 0000000000000400 R11: 0000000000000246 R12: 00007f724d58b6d4 [ 187.076941] R13: 00000000004c8e36 R14: 00000000004e03d0 R15: 0000000000000003 [ 187.090502] CPU: 0 PID: 9057 Comm: syz-executor.1 Not tainted 4.19.79 #0 [ 187.098950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.111126] Call Trace: [ 187.113866] dump_stack+0x172/0x1f0 [ 187.118491] should_fail.cold+0xa/0x1b [ 187.123766] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 187.131836] ? lock_downgrade+0x880/0x880 [ 187.139326] __should_failslab+0x121/0x190 [ 187.145592] should_failslab+0x9/0x14 [ 187.149975] __kmalloc+0x2e2/0x750 [ 187.154296] ? trace_hardirqs_on+0x67/0x220 [ 187.161001] ? release_sock+0x156/0x1c0 [ 187.168431] ? rds_message_alloc+0x4a/0x230 [ 187.174140] rds_message_alloc+0x4a/0x230 [ 187.179407] rds_sendmsg+0xfc4/0x2f90 [ 187.185025] ? rds_send_drop_to+0x1620/0x1620 [ 187.185058] ? copy_msghdr_from_user+0x2d0/0x430 [ 187.185080] ? selinux_socket_sendmsg+0x36/0x40 [ 187.198612] ? rds_send_drop_to+0x1620/0x1620 [ 187.198631] sock_sendmsg+0xd7/0x130 [ 187.198646] ? sock_sendmsg+0xd7/0x130 [ 187.198658] ___sys_sendmsg+0x803/0x920 [ 187.198675] ? copy_msghdr_from_user+0x430/0x430 [ 187.235191] ? lock_downgrade+0x880/0x880 [ 187.240134] ? kasan_check_read+0x11/0x20 [ 187.245354] ? __fget+0x367/0x540 [ 187.250072] ? iterate_fd+0x360/0x360 [ 187.259221] ? __fget_light+0x1a9/0x230 [ 187.269344] ? __fdget+0x1b/0x20 [ 187.278574] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 187.288386] __sys_sendmsg+0x105/0x1d0 [ 187.297756] ? __ia32_sys_shutdown+0x80/0x80 [ 187.305985] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 187.314134] ? do_syscall_64+0x26/0x620 [ 187.321531] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.329286] ? do_syscall_64+0x26/0x620 [ 187.336240] __x64_sys_sendmsg+0x78/0xb0 [ 187.345086] do_syscall_64+0xfd/0x620 [ 187.356633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.365249] RIP: 0033:0x459a59 [ 187.370821] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.403998] RSP: 002b:00007f89ae33bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 187.416257] RAX: ffffffffffffffda RBX: 00007f89ae33bc90 RCX: 0000000000459a59 [ 187.429188] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000004 [ 187.437579] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 11:57:11 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) 11:57:11 executing program 5: syz_mount_image$gfs2(&(0x7f0000001f40)='gfs2\x00', &(0x7f0000001f80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@hostdata={'hostdata', 0x3d, 'barrier'}}]}) msgget(0x3, 0x440) 11:57:11 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x3e00, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:11 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) [ 187.447014] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f89ae33c6d4 [ 187.458408] R13: 00000000004c7b76 R14: 00000000004dda00 R15: 0000000000000005 [ 187.500633] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 187.536253] FAULT_INJECTION: forcing a failure. [ 187.536253] name failslab, interval 1, probability 0, space 0, times 0 11:57:11 executing program 1 (fault-call:4 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 187.542680] gfs2: not a GFS2 filesystem 11:57:11 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x4000, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:11 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2201, 0x0) r1 = socket$inet6(0xa, 0x2, 0x73) sendmmsg$inet6(r1, &(0x7f0000006d00)=[{{&(0x7f0000002e00)={0xa, 0x0, 0x0, @dev}, 0x1b, 0x0, 0x0, &(0x7f00000031c0)=[@flowinfo={{0x14}}], 0x18}}], 0x1, 0x0) ioctl$int_in(r0, 0x80000000004d00, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r2, 0x40096102, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000200)={0x68, r4, 0x5, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x4c, 0x18, {0x0, @media='udp\x00'}}}}, 0x68}}, 0x0) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r5, 0x40096102, 0x0) r6 = accept4$inet(r5, &(0x7f00000001c0)={0x2, 0x0, @empty}, &(0x7f0000000280)=0x10, 0x180800) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000300)) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x820}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r4, 0x1, 0x70bd28, 0x25dfdbfb, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x7, @link='syz1\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x8000) [ 187.592444] CPU: 0 PID: 9077 Comm: syz-executor.0 Not tainted 4.19.79 #0 [ 187.599995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.609895] Call Trace: [ 187.614088] dump_stack+0x172/0x1f0 [ 187.618629] should_fail.cold+0xa/0x1b [ 187.622747] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 187.628650] ? percpu_ref_put_many+0x94/0x190 [ 187.633346] __should_failslab+0x121/0x190 [ 187.638038] should_failslab+0x9/0x14 11:57:11 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x80fe, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 187.642346] kmem_cache_alloc+0x2ae/0x700 [ 187.649448] ? map_id_range_down+0x1ee/0x370 [ 187.656587] ? __put_user_ns+0x70/0x70 [ 187.660634] selinux_inode_alloc_security+0xb6/0x2a0 [ 187.666134] security_inode_alloc+0x8a/0xd0 [ 187.670911] inode_init_always+0x56e/0xb40 [ 187.675442] alloc_inode+0x81/0x190 [ 187.680202] new_inode_pseudo+0x19/0xf0 [ 187.684674] new_inode+0x1f/0x40 [ 187.688096] shmem_get_inode+0x84/0x780 11:57:11 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) [ 187.692367] __shmem_file_setup.part.0+0x7e/0x2b0 [ 187.697588] shmem_file_setup+0x66/0x90 [ 187.702367] __x64_sys_memfd_create+0x2a2/0x470 [ 187.707568] ? memfd_fcntl+0x1a50/0x1a50 [ 187.713286] ? do_syscall_64+0x26/0x620 [ 187.717746] ? lockdep_hardirqs_on+0x415/0x5d0 [ 187.723692] ? trace_hardirqs_on+0x67/0x220 [ 187.728327] do_syscall_64+0xfd/0x620 [ 187.732302] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.739584] RIP: 0033:0x459a59 [ 187.739600] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.739607] RSP: 002b:00007f724d58aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 187.739620] RAX: ffffffffffffffda RBX: 0000000020000340 RCX: 0000000000459a59 [ 187.739627] RDX: 0000000020000368 RSI: 0000000000000000 RDI: 00000000004be9b7 [ 187.739634] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 187.739641] R10: 0000000000000400 R11: 0000000000000246 R12: 00007f724d58b6d4 [ 187.739648] R13: 00000000004c8e36 R14: 00000000004e03d0 R15: 0000000000000003 [ 187.753031] FAULT_INJECTION: forcing a failure. [ 187.753031] name failslab, interval 1, probability 0, space 0, times 0 [ 187.788565] CPU: 0 PID: 9088 Comm: syz-executor.1 Not tainted 4.19.79 #0 [ 187.805253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.861765] Call Trace: [ 187.861797] dump_stack+0x172/0x1f0 11:57:11 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0xc0fe, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 187.861817] should_fail.cold+0xa/0x1b [ 187.861834] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 187.861858] __should_failslab+0x121/0x190 [ 187.861873] should_failslab+0x9/0x14 [ 187.861887] __kmalloc+0x71/0x750 [ 187.861903] ? is_bpf_text_address+0xd3/0x170 [ 187.861917] ? kernel_text_address+0x73/0xf0 [ 187.861932] ? rds_message_alloc+0x4a/0x230 [ 187.861950] rds_message_alloc+0x4a/0x230 [ 187.861966] rds_send_probe.constprop.0+0x9c/0xbe0 [ 187.861981] ? check_noncircular+0x20/0x20 [ 187.862001] ? rds_send_drop_acked+0xd0/0xd0 [ 187.929639] ? mark_held_locks+0x100/0x100 [ 187.929655] ? __lock_acquire+0x6ee/0x49c0 [ 187.929673] rds_send_pong+0x1e/0x23 [ 187.929688] rds_recv_incoming+0xc14/0x11c0 [ 187.929700] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 187.929720] ? rds_recv_rcvbuf_delta.part.0+0x3f0/0x3f0 [ 187.929736] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 11:57:12 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) [ 187.929753] rds_loop_xmit+0xf3/0x2a0 [ 187.929765] ? rds_loop_inc_free+0x20/0x20 [ 187.929779] rds_send_xmit+0x10ff/0x2540 [ 187.929809] ? rds_send_mprds_hash+0x4d0/0x4d0 [ 187.929824] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 187.929841] ? check_preemption_disabled+0x48/0x290 [ 187.929857] rds_sendmsg+0x2978/0x2f90 [ 187.929881] ? rds_send_drop_to+0x1620/0x1620 [ 187.949714] ? copy_msghdr_from_user+0x2d0/0x430 [ 187.949739] ? selinux_socket_sendmsg+0x36/0x40 [ 187.949757] ? rds_send_drop_to+0x1620/0x1620 [ 187.949773] sock_sendmsg+0xd7/0x130 [ 187.949788] ? sock_sendmsg+0xd7/0x130 [ 187.949801] ___sys_sendmsg+0x803/0x920 [ 187.949816] ? copy_msghdr_from_user+0x430/0x430 [ 187.949835] ? lock_downgrade+0x880/0x880 [ 187.949852] ? kasan_check_read+0x11/0x20 [ 187.949873] ? __fget+0x367/0x540 [ 187.949892] ? iterate_fd+0x360/0x360 [ 187.968901] ? __fget_light+0x1a9/0x230 [ 187.968919] ? __fdget+0x1b/0x20 [ 187.980728] QAT: failed to copy from user cfg_data. [ 187.985691] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 187.985711] __sys_sendmsg+0x105/0x1d0 [ 187.985728] ? __ia32_sys_shutdown+0x80/0x80 [ 188.012697] ? trace_hardirqs_on_thunk+0x1a/0x1c 11:57:12 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0xd000, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 188.032219] QAT: failed to copy from user cfg_data. [ 188.039112] ? do_syscall_64+0x26/0x620 [ 188.039131] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.039143] ? do_syscall_64+0x26/0x620 [ 188.039162] __x64_sys_sendmsg+0x78/0xb0 [ 188.039182] do_syscall_64+0xfd/0x620 [ 188.062464] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.062477] RIP: 0033:0x459a59 [ 188.062492] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 188.062499] RSP: 002b:00007f89ae33bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 188.062514] RAX: ffffffffffffffda RBX: 00007f89ae33bc90 RCX: 0000000000459a59 [ 188.062523] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000004 [ 188.062531] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 188.062539] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f89ae33c6d4 [ 188.062547] R13: 00000000004c7b76 R14: 00000000004dda00 R15: 0000000000000005 [ 188.077520] QAT: failed to copy from user cfg_data. [ 188.104796] FAULT_INJECTION: forcing a failure. [ 188.104796] name failslab, interval 1, probability 0, space 0, times 0 [ 188.119000] QAT: failed to copy from user cfg_data. [ 188.196758] CPU: 1 PID: 9101 Comm: syz-executor.0 Not tainted 4.19.79 #0 [ 188.235029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.235036] Call Trace: [ 188.235061] dump_stack+0x172/0x1f0 [ 188.235079] should_fail.cold+0xa/0x1b [ 188.235096] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 188.235112] ? lock_downgrade+0x880/0x880 [ 188.235133] __should_failslab+0x121/0x190 [ 188.235151] should_failslab+0x9/0x14 [ 188.258206] kmem_cache_alloc+0x2ae/0x700 [ 188.258222] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 188.258241] ? lockdep_hardirqs_on+0x415/0x5d0 [ 188.274044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 188.274063] ? timespec64_trunc+0xf0/0x180 [ 188.274077] __d_alloc+0x2e/0x9c0 [ 188.274093] ? ktime_get_coarse_real_ts64+0x1ba/0x2b0 [ 188.274110] d_alloc_pseudo+0x1e/0x70 [ 188.274125] alloc_file_pseudo+0xe2/0x280 11:57:12 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2201, 0x0) r1 = socket$inet6(0xa, 0x2, 0x73) sendmmsg$inet6(r1, &(0x7f0000006d00)=[{{&(0x7f0000002e00)={0xa, 0x0, 0x0, @dev}, 0x1b, 0x0, 0x0, &(0x7f00000031c0)=[@flowinfo={{0x14}}], 0x18}}], 0x1, 0x0) ioctl$int_in(r0, 0x80000000004d00, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r2, 0x40096102, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000200)={0x68, r4, 0x5, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x4c, 0x18, {0x0, @media='udp\x00'}}}}, 0x68}}, 0x0) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r5, 0x40096102, 0x0) r6 = accept4$inet(r5, &(0x7f00000001c0)={0x2, 0x0, @empty}, &(0x7f0000000280)=0x10, 0x180800) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000300)) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x820}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r4, 0x1, 0x70bd28, 0x25dfdbfb, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x7, @link='syz1\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x8000) [ 188.274138] ? __lockdep_init_map+0x10c/0x5b0 [ 188.274160] ? alloc_file+0x4d0/0x4d0 [ 188.351685] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 188.351702] ? kasan_check_write+0x14/0x20 [ 188.351723] __shmem_file_setup.part.0+0x108/0x2b0 [ 188.351742] shmem_file_setup+0x66/0x90 [ 188.351759] __x64_sys_memfd_create+0x2a2/0x470 [ 188.351773] ? memfd_fcntl+0x1a50/0x1a50 [ 188.351792] ? do_syscall_64+0x26/0x620 [ 188.394969] QAT: failed to copy from user cfg_data. [ 188.397063] ? lockdep_hardirqs_on+0x415/0x5d0 [ 188.397089] ? trace_hardirqs_on+0x67/0x220 [ 188.412096] do_syscall_64+0xfd/0x620 [ 188.412117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.412127] RIP: 0033:0x459a59 [ 188.412142] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:57:12 executing program 5: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r2, 0xab07, 0x7) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = openat$uinput(0xffffffffffffff9c, 0x0, 0x805, 0x0) dup(r3) 11:57:12 executing program 1 (fault-call:4 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:12 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) 11:57:12 executing program 0 (fault-call:0 fault-nth:4): syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@oldalloc='oldalloc'}]}) 11:57:12 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0xfc00, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 188.412148] RSP: 002b:00007f724d58aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 188.412162] RAX: ffffffffffffffda RBX: 0000000020000340 RCX: 0000000000459a59 [ 188.412168] RDX: 0000000020000368 RSI: 0000000000000000 RDI: 00000000004be9b7 [ 188.412180] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 188.457551] QAT: failed to copy from user cfg_data. [ 188.463903] R10: 0000000000000400 R11: 0000000000000246 R12: 00007f724d58b6d4 11:57:12 executing program 3: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x5}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r5}]]}}}]}, 0x40}}, 0x0) 11:57:12 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) ioctl$sock_ifreq(r3, 0x8922, &(0x7f0000000080)={'veth0_to_team\x00', @ifru_addrs=@ethernet={0x1}}) setns(r2, 0x40000000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendmmsg$inet6(r4, &(0x7f0000005880)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f00000012c0)=[@hoplimit_2292={{0x14}}], 0x18}}], 0x1, 0x0) [ 188.463912] R13: 00000000004c8e36 R14: 00000000004e03d0 R15: 0000000000000003 [ 188.598204] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 11:57:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 188.693555] FAULT_INJECTION: forcing a failure. [ 188.693555] name failslab, interval 1, probability 0, space 0, times 0 [ 188.768401] CPU: 1 PID: 9124 Comm: syz-executor.0 Not tainted 4.19.79 #0 [ 188.776424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.786028] Call Trace: [ 188.789166] dump_stack+0x172/0x1f0 [ 188.793039] should_fail.cold+0xa/0x1b [ 188.797212] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 188.802362] ? lock_downgrade+0x880/0x880 [ 188.806933] __should_failslab+0x121/0x190 [ 188.811216] should_failslab+0x9/0x14 [ 188.815063] kmem_cache_alloc+0x2ae/0x700 [ 188.819468] __alloc_file+0x27/0x330 [ 188.823213] alloc_empty_file+0x72/0x170 [ 188.827329] alloc_file+0x5e/0x4d0 [ 188.831178] alloc_file_pseudo+0x189/0x280 [ 188.835809] ? alloc_file+0x4d0/0x4d0 [ 188.839721] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 188.839739] ? kasan_check_write+0x14/0x20 [ 188.839759] __shmem_file_setup.part.0+0x108/0x2b0 [ 188.839778] shmem_file_setup+0x66/0x90 [ 188.839796] __x64_sys_memfd_create+0x2a2/0x470 [ 188.856181] ? memfd_fcntl+0x1a50/0x1a50 [ 188.856198] ? do_syscall_64+0x26/0x620 [ 188.856213] ? lockdep_hardirqs_on+0x415/0x5d0 [ 188.856230] ? trace_hardirqs_on+0x67/0x220 [ 188.883550] do_syscall_64+0xfd/0x620 [ 188.887690] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.893099] RIP: 0033:0x459a59 [ 188.896414] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:57:12 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) fremovexattr(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="7497ff7374656c3f363250dce4e914b7e020b8621f642e232a7b5d706f7369780061636c5f8c5c9e706406a90bb3d0908daff5369b8897cc850c2089ff616d44f2cf298fe4c8a88156ea091d2ec48e26557abfba85b12429f06968640a0b1d01320000000000000000"], &(0x7f00000003c0)=""/78, 0x4e) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000980)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3, 0x100000000}], 0x1, 0x0) 11:57:12 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0xfe80, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) 11:57:13 executing program 2: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0xfec0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 188.916571] RSP: 002b:00007f724d58aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 188.925590] RAX: ffffffffffffffda RBX: 0000000020000340 RCX: 0000000000459a59 [ 188.933182] RDX: 0000000020000368 RSI: 0000000000000000 RDI: 00000000004be9b7 [ 188.933191] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 188.933199] R10: 0000000000000400 R11: 0000000000000246 R12: 00007f724d58b6d4 [ 188.933206] R13: 00000000004c8e36 R14: 00000000004e03d0 R15: 0000000000000003 11:57:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000015, 0x805, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0x2, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0000000000000], [], @remote}}, 0x1c, 0x0}, 0x0) [ 189.006166] block nbd5: Receive control failed (result -22) [ 189.026391] block nbd5: shutting down sockets [ 189.032303] [ 189.033043] kobject: 'loop4' (00000000ca9adf4f): kobject_uevent_env [ 189.033973] ============================================ [ 189.033976] WARNING: possible recursive locking detected [ 189.033984] 4.19.79 #0 Not tainted [ 189.033987] -------------------------------------------- [ 189.034000] kworker/u5:1/9149 is trying to acquire lock: [ 189.046872] kobject: 'loop3' (000000009af191bc): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 189.049333] 00000000dc1d0876 ((wq_completion)"knbd%d-recv"nbd->index){+.+.}, at: flush_workqueue+0xf7/0x14b0 [ 189.049369] [ 189.049369] but task is already holding lock: [ 189.064981] kobject: 'loop4' (00000000ca9adf4f): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 189.069914] 00000000dc1d0876 ((wq_completion)"knbd%d-recv"nbd->index){+.+.}, at: process_one_work+0x87e/0x1750 [ 189.069945] [ 189.069945] other info that might help us debug this: [ 189.069948] Possible unsafe locking scenario: [ 189.069948] [ 189.069951] CPU0 [ 189.069953] ---- [ 189.069955] lock((wq_completion)"knbd%d-recv"nbd->index); [ 189.069963] lock((wq_completion)"knbd%d-recv"nbd->index); [ 189.069970] [ 189.069970] *** DEADLOCK *** [ 189.069970] [ 189.069973] May be due to missing lock nesting notation [ 189.069973] [ 189.069981] 3 locks held by kworker/u5:1/9149: [ 189.069984] #0: 00000000dc1d0876 ((wq_completion)"knbd%d-recv"nbd->index){+.+.}, at: process_one_work+0x87e/0x1750 [ 189.123212] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 189.126628] #1: 000000007f0b712b ((work_completion)(&args->work)){+.+.}, at: process_one_work+0x8b4/0x1750 [ 189.126679] #2: 0000000025c76702 (&nbd->config_lock){+.+.}, at: refcount_dec_and_mutex_lock+0x56/0x90 [ 189.210922] [ 189.210922] stack backtrace: [ 189.216506] CPU: 1 PID: 9149 Comm: kworker/u5:1 Not tainted 4.19.79 #0 [ 189.223332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.234551] Workqueue: knbd5-recv recv_work [ 189.238915] Call Trace: [ 189.241914] dump_stack+0x172/0x1f0 [ 189.245866] __lock_acquire.cold+0x20f/0x4a7 [ 189.250586] ? mark_held_locks+0x100/0x100 [ 189.255251] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 189.262379] ? mark_held_locks+0x100/0x100 [ 189.266991] ? lock_downgrade+0x880/0x880 [ 189.271374] ? __lock_is_held+0xb6/0x140 [ 189.276200] ? trace_hardirqs_off+0x62/0x220 [ 189.281098] ? drain_workqueue+0x2b/0x470 [ 189.285876] lock_acquire+0x16f/0x3f0 [ 189.290360] ? flush_workqueue+0xf7/0x14b0 [ 189.295142] flush_workqueue+0x126/0x14b0 [ 189.300068] ? flush_workqueue+0xf7/0x14b0 [ 189.305187] ? process_one_work+0x989/0x1750 [ 189.309860] ? worker_thread+0x98/0xe40 [ 189.314719] ? lock_downgrade+0x880/0x880 [ 189.320394] ? pwq_unbound_release_workfn+0x2e0/0x2e0 [ 189.326927] drain_workqueue+0x1b4/0x470 [ 189.331095] ? drain_workqueue+0x1b4/0x470 [ 189.335502] ? kfree+0x170/0x220 [ 189.339439] destroy_workqueue+0x21/0x6b0 [ 189.344900] ? nbd_config_put+0x36a/0x860 [ 189.349761] nbd_config_put+0x3cf/0x860 [ 189.356527] recv_work+0x19b/0x200 [ 189.360531] process_one_work+0x989/0x1750 [ 189.366297] ? pwq_dec_nr_in_flight+0x320/0x320 [ 189.372824] ? lock_acquire+0x16f/0x3f0 [ 189.377187] ? kasan_check_write+0x14/0x20 [ 189.382376] ? do_raw_spin_lock+0xc8/0x240 [ 189.388041] worker_thread+0x98/0xe40 [ 189.392086] ? trace_hardirqs_on+0x67/0x220 [ 189.398452] kthread+0x354/0x420 [ 189.402172] ? process_one_work+0x1750/0x1750 [ 189.407272] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 189.413660] ret_from_fork+0x24/0x30 [ 189.423049] kobject: 'loop4' (00000000ca9adf4f): kobject_uevent_env [ 189.430856] kobject: 'loop4' (00000000ca9adf4f): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 189.447473] kobject: 'loop0' (00000000bdb0fb12): kobject_uevent_env [ 189.455413] kobject: 'loop0' (00000000bdb0fb12): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 189.472762] kobject: 'loop2' (000000000c77fc03): kobject_uevent_env [ 189.477875] kobject: 'loop4' (00000000ca9adf4f): kobject_uevent_env [ 189.479817] kobject: 'loop2' (000000000c77fc03): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 189.487115] kobject: 'loop4' (00000000ca9adf4f): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 189.550029] kobject: 'loop4' (00000000ca9adf4f): kobject_uevent_env [ 189.556958] kobject: 'loop4' (00000000ca9adf4f): fill_kobj_path: path = '/devices/virtual/block/loop4'