00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 04:45:01 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000400)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x2, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000280)={0x3, &(0x7f0000000240)=[{0x0}, {}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc010641d, &(0x7f0000000300)={r5, &(0x7f00000002c0)=""/6}) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000220007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a0aa1c0900000000000013", 0x39}], 0x1}, 0x0) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000000), &(0x7f0000000100)=0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in=@local, 0x4e24, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x6}, {0x0, 0x0, 0xa9f, 0xfffffffffffffffe}, {0x0, 0x0, 0x0, 0x392d}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x7}}, 0xe8) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x400) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r8, 0x0) ftruncate(r6, 0x48280) fcntl$setstatus(r2, 0x4, 0x800) r9 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$P9_RATTACH(r9, &(0x7f0000000080)={0x14}, 0x14) io_submit(r7, 0x87ac, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 04:45:01 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) r6 = socket$inet(0xa, 0x801, 0x84) listen(r6, 0x0) socket$inet6(0xa, 0x801, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) bind$packet(r3, &(0x7f0000000000)={0x11, 0x10, r5, 0x1, 0x8}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 159.395113][ T8463] JFS: discard option not supported on device [ 159.421394][ T8463] jfs: Unrecognized mount option "res=ip6_vti0" or missing value 04:45:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x9, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x10}, [@alu={0x8000000201a7f11, 0x0, 0x7, 0x7, 0x1, 0x3e}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfd, &(0x7f0000000080)=""/253, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x40}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = dup(0xffffffffffffffff) sendto$llc(r0, &(0x7f00000001c0)="eb6c44043347348239db3af9c9c8d0fafe1540f76e49debec65142f6902886773cebc1e2c3b73aa6dd0e0fd905141563ae31d65730e52ae1587e38287f6831672eac499de942f67d060eac55afe4c51361d8ca792544f610c4cdff246f22239208c41fdfce8ea9799011bea56f1c3732c57ec01efb81debabca95b7a79d2f9a01c8a609f13784efe2dd8", 0x8a, 0x4008001, &(0x7f0000000280)={0x1a, 0x10e, 0x0, 0x2, 0x1, 0x4}, 0x10) [ 159.511879][ T8475] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:01 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="b6"], 0x1) writev(r1, &(0x7f0000000380)=[{&(0x7f0000000200)="e5", 0x1}], 0x1) fcntl$setstatus(r0, 0x4, 0x6000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) [ 159.559994][ T8475] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:01 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xc2426cf0fc03192a, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x31f}, 0x0) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000080)) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x92) ioctl$KVM_ASSIGN_DEV_IRQ(r2, 0x4040ae70, &(0x7f0000000100)={0x6, 0xcbee, 0x6, 0x404}) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x3, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) socket$inet_udplite(0x2, 0x2, 0x88) [ 159.631831][ T26] audit: type=1804 audit(1573274701.594:31): pid=8481 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir313103772/syzkaller.b8kemC/9/bus" dev="sda1" ino=16570 res=1 [ 159.695150][ T26] audit: type=1804 audit(1573274701.604:32): pid=8481 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir313103772/syzkaller.b8kemC/9/bus" dev="sda1" ino=16570 res=1 04:45:01 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) r6 = socket$inet(0xa, 0x801, 0x84) listen(r6, 0x0) socket$inet6(0xa, 0x801, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) bind$packet(r3, &(0x7f0000000000)={0x11, 0x10, r5, 0x1, 0x8}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000000)={0xc, 0x0, 0x1, {0x10001, 0x400, 0x8c, 0x100}}) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$MON_IOCQ_RING_SIZE(r2, 0x9205) 04:45:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x70d, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x20, 0x10, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x10aec61bc6caa7b3}}, 0x20}}, 0x0) [ 159.919852][ T8502] device hsr0 entered promiscuous mode 04:45:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000000)={0xc, 0x0, 0x1, {0x10001, 0x400, 0x8c, 0x100}}) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$MON_IOCQ_RING_SIZE(r2, 0x9205) 04:45:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 04:45:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302ef746b33c81c3afa224412a7eef5fdbf74cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473786cd89e9b08e3f5972fe9ca162b123e19268c89c9dd81c796f27f537cc5a3fb54aff8eaf5b96a671"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0xfcd980c5a44a655c, &(0x7f0000000580)=ANY=[]) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000080)) [ 160.048909][ T8509] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:02 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) r6 = socket$inet(0xa, 0x801, 0x84) listen(r6, 0x0) socket$inet6(0xa, 0x801, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) bind$packet(r3, &(0x7f0000000000)={0x11, 0x10, r5, 0x1, 0x8}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 160.092043][ T8509] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302ef746b33c81c3afa224412a7eef5fdbf74cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473786cd89e9b08e3f5972fe9ca162b123e19268c89c9dd81c796f27f537cc5a3fb54aff8eaf5b96a671"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0xfcd980c5a44a655c, &(0x7f0000000580)=ANY=[]) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000080)) 04:45:02 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x900) r1 = syz_open_dev$cec(&(0x7f00000003c0)='/dev/cec#\x00', 0x3, 0x2) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x419}}, 0x0, 0x86d, 0x0, "b11417f0206e36c7bf49104a84f9dc11b91ed73dc8bb43273f95ab2365e422ece3ebda60cd0abd80bb8887b2f90c9c520f902ebfe337f75eb62fa354d9bb7b83d1c0a860aaa04f8ed18fbb2863261f10"}, 0xd8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000240)='./file0\x00') r2 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./file0\x00') remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x1000002, 0x3ff, 0x4000) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x23080, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="c9bb666fcb493efbc7112c109c6691fac46875662911847d63"], &(0x7f0000000300)='.', 0x0, 0x1110, 0x0) 04:45:02 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) r6 = socket$inet(0xa, 0x801, 0x84) listen(r6, 0x0) socket$inet6(0xa, 0x801, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) bind$packet(r3, &(0x7f0000000000)={0x11, 0x10, r5, 0x1, 0x8}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:02 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffdffffffffffc, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r5 = gettid() sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=ANY=[@ANYBLOB="840000001000010400000000000000000000000009f072f3c5111f3adf94572f087b67b70bb1f4ac9a146c7b17ce7525ccd1d1cae6dedc92f1a1746c89b8f0597d1631e71f2da48c81466b1bc2f989613c866f6947043c31b3f1ca9acb75392a4abb2e22357f0d9270b3afb575bef9504a72e2b4b188e83da2f209aea41b877b906369168d24dc0c87b3987295811175bf852ec60694b9ee5a732385aba7dc75c3b0355bea356ca33e1b75d6422ec40528f6d348872630873cb9cd2c88d94f192a76043b5f4b91dc24ea59337b24e4dee47a4ec354cd2adad32608bc0dd2d3f759e6496f7788e65d", @ANYRES32=r4, @ANYBLOB="000000000000000008001300", @ANYRES32=r5, @ANYBLOB="5c0019000800010000000000080006000000000010000200657468315c707070305d00000800060000000000050001000000000014000500441fa27574fc0e85df6790088de8fc0a08000100000000000c0002006c6f282b2b7b0000"], 0x84}}, 0x0) write$cgroup_pid(r1, &(0x7f0000000180)=r5, 0x12) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r6, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x114) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r7, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x160) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000000)={0x18}, 0x18) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x7f, 0x3, 0x1f, 0x66}]}) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000000)={0x18}, 0x18) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) r8 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x4000000000802, 0x0) ioctl$UI_DEV_SETUP(r8, 0x5501, 0x0) r9 = socket$inet6(0x10, 0x80003, 0x0) sendmsg(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)="5500000018007fafb72d1cb2a4a280930206430200a843090626274d040016001500154005004c00007aa3c728f1c46b7b31afdc1338d54400009b84136ef75afb6cde448daa7227c43ab8620000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$sock_x25_SIOCDELRT(r11, 0x890c, &(0x7f00000002c0)={@null=' \x00', 0xe, 'dummy0\x00'}) [ 160.556460][ T8534] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. 04:45:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 160.624735][ T8529] mmap: syz-executor.3 (8529) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 04:45:02 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) r6 = socket$inet(0xa, 0x801, 0x84) listen(r6, 0x0) socket$inet6(0xa, 0x801, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) bind$packet(r3, &(0x7f0000000000)={0x11, 0x10, r5, 0x1, 0x8}, 0x14) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 160.737431][ T8539] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 160.782474][ T8539] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:02 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x900) r1 = syz_open_dev$cec(&(0x7f00000003c0)='/dev/cec#\x00', 0x3, 0x2) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x419}}, 0x0, 0x86d, 0x0, "b11417f0206e36c7bf49104a84f9dc11b91ed73dc8bb43273f95ab2365e422ece3ebda60cd0abd80bb8887b2f90c9c520f902ebfe337f75eb62fa354d9bb7b83d1c0a860aaa04f8ed18fbb2863261f10"}, 0xd8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000240)='./file0\x00') r2 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./file0\x00') remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x1000002, 0x3ff, 0x4000) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x23080, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="c9bb666fcb493efbc7112c109c6691fac46875662911847d63"], &(0x7f0000000300)='.', 0x0, 0x1110, 0x0) 04:45:02 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) r6 = socket$inet(0xa, 0x801, 0x84) listen(r6, 0x0) socket$inet6(0xa, 0x801, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) bind$packet(r3, &(0x7f0000000000)={0x11, 0x10, r5, 0x1, 0x8}, 0x14) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 160.866328][ T8547] netlink: 'syz-executor.2': attribute type 21 has an invalid length. 04:45:03 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) r6 = socket$inet(0xa, 0x801, 0x84) listen(r6, 0x0) socket$inet6(0xa, 0x801, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) bind$packet(r3, &(0x7f0000000000)={0x11, 0x10, r5, 0x1, 0x8}, 0x14) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 161.104935][ T8547] netlink: 29 bytes leftover after parsing attributes in process `syz-executor.2'. [ 161.170297][ T8534] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. 04:45:03 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) r6 = socket$inet(0xa, 0x801, 0x84) listen(r6, 0x0) socket$inet6(0xa, 0x801, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) bind$packet(r3, &(0x7f0000000000)={0x11, 0x10, r5, 0x1, 0x8}, 0x14) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:03 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) r6 = socket$inet(0xa, 0x801, 0x84) listen(r6, 0x0) socket$inet6(0xa, 0x801, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 04:45:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) r6 = socket$inet(0xa, 0x801, 0x84) listen(r6, 0x0) socket$inet6(0xa, 0x801, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) bind$packet(r3, &(0x7f0000000000)={0x11, 0x10, r5, 0x1, 0x8}, 0x14) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:03 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x900) r1 = syz_open_dev$cec(&(0x7f00000003c0)='/dev/cec#\x00', 0x3, 0x2) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x419}}, 0x0, 0x86d, 0x0, "b11417f0206e36c7bf49104a84f9dc11b91ed73dc8bb43273f95ab2365e422ece3ebda60cd0abd80bb8887b2f90c9c520f902ebfe337f75eb62fa354d9bb7b83d1c0a860aaa04f8ed18fbb2863261f10"}, 0xd8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000240)='./file0\x00') r2 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./file0\x00') remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x1000002, 0x3ff, 0x4000) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x23080, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="c9bb666fcb493efbc7112c109c6691fac46875662911847d63"], &(0x7f0000000300)='.', 0x0, 0x1110, 0x0) 04:45:03 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) r6 = socket$inet(0xa, 0x801, 0x84) listen(r6, 0x0) socket$inet6(0xa, 0x801, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:03 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) r6 = socket$inet(0xa, 0x801, 0x84) listen(r6, 0x0) socket$inet6(0xa, 0x801, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:03 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x900) r1 = syz_open_dev$cec(&(0x7f00000003c0)='/dev/cec#\x00', 0x3, 0x2) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x419}}, 0x0, 0x86d, 0x0, "b11417f0206e36c7bf49104a84f9dc11b91ed73dc8bb43273f95ab2365e422ece3ebda60cd0abd80bb8887b2f90c9c520f902ebfe337f75eb62fa354d9bb7b83d1c0a860aaa04f8ed18fbb2863261f10"}, 0xd8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000240)='./file0\x00') r2 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./file0\x00') remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x1000002, 0x3ff, 0x4000) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x23080, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="c9bb666fcb493efbc7112c109c6691fac46875662911847d63"], &(0x7f0000000300)='.', 0x0, 0x1110, 0x0) 04:45:03 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x900) r1 = syz_open_dev$cec(&(0x7f00000003c0)='/dev/cec#\x00', 0x3, 0x2) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x419}}, 0x0, 0x86d, 0x0, "b11417f0206e36c7bf49104a84f9dc11b91ed73dc8bb43273f95ab2365e422ece3ebda60cd0abd80bb8887b2f90c9c520f902ebfe337f75eb62fa354d9bb7b83d1c0a860aaa04f8ed18fbb2863261f10"}, 0xd8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000240)='./file0\x00') r2 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./file0\x00') remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x1000002, 0x3ff, 0x4000) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x23080, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="c9bb666fcb493efbc7112c109c6691fac46875662911847d63"], &(0x7f0000000300)='.', 0x0, 0x1110, 0x0) 04:45:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 04:45:04 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) r6 = socket$inet(0xa, 0x801, 0x84) listen(r6, 0x0) socket$inet6(0xa, 0x801, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 162.100695][ T8595] validate_nla: 2 callbacks suppressed [ 162.100739][ T8595] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 162.205501][ T8595] __nla_validate_parse: 2 callbacks suppressed [ 162.205547][ T8595] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x9800, 0x0, 0x0, 0x8, 0x67}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x290}, 0x3e) 04:45:04 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x7, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) getpid() r4 = getpid() rt_tgsigqueueinfo(r4, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000640)={0x0}, &(0x7f0000000680)=0xc) r6 = syz_open_procfs(r5, 0x0) preadv(r6, &(0x7f00000003c0)=[{&(0x7f0000000500)=""/135, 0x87}], 0x1, 0x2) ioctl$VT_SETMODE(r6, 0x5602, &(0x7f0000000180)={0x6, 0x19, 0x4f1, 0x8000}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000200)='attr/keycreate\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x315, 0x0) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000100)={'syz_tun\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'syz_tun\x00', 0x2000000000000201}) 04:45:04 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) r6 = socket$inet(0xa, 0x801, 0x84) listen(r6, 0x0) socket$inet6(0xa, 0x801, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:04 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 04:45:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffa0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:45:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 04:45:04 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) r6 = socket$inet(0xa, 0x801, 0x84) listen(r6, 0x0) socket$inet6(0xa, 0x801, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 162.784563][ T8623] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 04:45:04 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x200000, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f00000002c0)={0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r12, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r13 = socket$rds(0x15, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = fcntl$dupfd(r14, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) r17 = accept4$inet(r16, &(0x7f0000000480)={0x2, 0x0, @multicast2}, &(0x7f00000004c0)=0x10, 0x0) clone3(&(0x7f0000000740)={0x10000000, &(0x7f0000000500)=0xffffffffffffffff, &(0x7f0000000540)=0x0, &(0x7f0000000580), 0x0, 0x0, &(0x7f00000005c0)=""/102, 0x66, &(0x7f0000000640)=""/224}, 0x40) r20 = geteuid() r21 = socket$inet_udp(0x2, 0x2, 0x0) fstat(r21, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r22, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r25 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r24, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r27 = gettid() sendmsg$nl_route(r25, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x84, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r26}, [@IFLA_NET_NS_PID={0x8, 0x13, r27}, @IFLA_PORT_SELF={0x5c, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x5}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x84}}, 0x0) r28 = geteuid() r29 = socket$inet_udp(0x2, 0x2, 0x0) fstat(r29, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r31, 0x0) r32 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r32, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r33 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r33, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r34 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r34, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r35 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r35, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}, 0x1, 0x0, 0x0, 0x40}, 0x0) r36 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r36, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r37 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r37, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r39 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r38, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r41 = gettid() sendmsg$nl_route(r39, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x84, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r40}, [@IFLA_NET_NS_PID={0x8, 0x13, r41}, @IFLA_PORT_SELF={0x5c, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x5}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x84}}, 0x0) r42 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002080)='/dev/cachefiles\x00', 0x9000, 0x0) r43 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r43, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r44 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r44, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r45 = openat$kvm(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/kvm\x00', 0x50100, 0x0) r46 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r46, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r47 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r47, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r48 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000002100)='/dev/vhost-vsock\x00', 0x2, 0x0) r49 = fsopen(&(0x7f0000002140)='fuse\x00', 0x3) r50 = syz_open_dev$cec(&(0x7f0000002180)='/dev/cec#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r52 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r51, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r54 = gettid() sendmsg$nl_route(r52, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x84, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r53}, [@IFLA_NET_NS_PID={0x8, 0x13, r54}, @IFLA_PORT_SELF={0x5c, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x5}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x84}}, 0x0) r55 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r55, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r56) r57 = openat$full(0xffffffffffffff9c, &(0x7f00000021c0)='/dev/full\x00', 0x800d3a527c8d2f3b, 0x0) r58 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000002200)='/dev/dlm-control\x00', 0x0, 0x0) r59 = syz_open_dev$dri(&(0x7f0000002240)='/dev/dri/card#\x00', 0x39d, 0x800) r60 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r60, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r62 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r61, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r64 = gettid() sendmsg$nl_route(r62, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x84, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r63}, [@IFLA_NET_NS_PID={0x8, 0x13, r64}, @IFLA_PORT_SELF={0x5c, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x5}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x84}}, 0x0) r65 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r65, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r67) r68 = socket$inet_udp(0x2, 0x2, 0x0) fstat(r68, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r69, 0x0) getresuid(&(0x7f0000002280), &(0x7f00000022c0), &(0x7f0000002300)=0x0) r71 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r71, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r72 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r72, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r73 = syz_open_procfs(r66, &(0x7f0000003940)='net/protocols\x00') r74 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r74, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r75 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r75, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r76 = syz_open_dev$video(&(0x7f0000003980)='/dev/video#\x00', 0x10001, 0x8000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r78 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r77, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r80 = gettid() sendmsg$nl_route(r78, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x84, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r79}, [@IFLA_NET_NS_PID={0x8, 0x13, r80}, @IFLA_PORT_SELF={0x5c, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x5}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x84}}, 0x0) r81 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x3, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r81, 0x0, 0x1, &(0x7f00000003c0)='\x00', r82}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004c40)={r80, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000004c00)='/dev/video#\x00', r82}, 0x30) r84 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r84, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r85) r86 = socket$inet_udp(0x2, 0x2, 0x0) fstat(r86, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r87, 0x0) r88 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r88, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r89 = syz_open_dev$loop(&(0x7f0000004c80)='/dev/loop#\x00', 0x1, 0xec7c87b22071e720) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r91 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r90, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r93 = gettid() sendmsg$nl_route(r91, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x84, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r92}, [@IFLA_NET_NS_PID={0x8, 0x13, r93}, @IFLA_PORT_SELF={0x5c, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x5}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x84}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r95 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r94, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r97 = gettid() sendmsg$nl_route(r95, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x84, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r96}, [@IFLA_NET_NS_PID={0x8, 0x13, r97}, @IFLA_PORT_SELF={0x5c, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x5}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x84}}, 0x0) r98 = geteuid() r99 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r99, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r100) r101 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r101, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r102) r103 = getegid() r104 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r104, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r105 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r105, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r106 = openat(0xffffffffffffffff, &(0x7f0000004f80)='./file0\x00', 0x3adc02, 0x88) r107 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r107, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r108 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000004fc0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r109 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r109, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r110 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r110, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r111 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r111, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r112 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r112, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r113 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r113, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r114 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r114, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r115 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r115, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r116) r117 = socket$inet_udp(0x2, 0x2, 0x0) fstat(r117, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r118, 0x0) r119 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r120 = inotify_init1(0x800) r121 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r121, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) sendmmsg$unix(r0, &(0x7f0000005680)=[{&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e22}, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="9ab09c016ac845a1565c23f19105c1fe0e57b45721a8e851f59bac8ceb7adbd34687b71a6d32ce60831ed51d4ee4e5bb1925b943c47e94e887d912d3e8d3a70bbabe3345d2620acb781ad5760a2dcf7fa2b77d8ceb5eab1e8a38ac2a776dc87b26d1a9cceecab2fe0cbe56f56db3666a809e5ae5aacbc5b1dfff94c17dfa7fcfabfae394fe3f28e7e1fcda9a02bf3c3276da396262d2f5635eff1084a34e13eb"}, {&(0x7f0000000200)="55a9e0c383328627d322a0395689d8b08c05d798912d39a370af9b133ab1185cd8f7d23552bba4569b0491f11961fb1c8cdad5ba"}, {&(0x7f0000000240)}], 0x0, &(0x7f0000000780)=[@rights={{0x0, 0x1, 0x1, [r1, r2, r0, r3]}}, @cred={{0x0, 0x1, 0x2, {r7, r8, r11}}}, @rights={{0x0, 0x1, 0x1, [r12, r13, r17]}}, @cred={{0x0, 0x1, 0x2, {r19, r20, r22}}}, @cred={{0x0, 0x1, 0x2, {r27, r28, r31}}}], 0x0, 0x1}, {&(0x7f0000000840)=@file={0x1, './file0\x00'}, 0x0, &(0x7f0000001980)=[{&(0x7f00000008c0)="be53bdd601325a9cf8ea7030c1ee4fb0b46b1bd0caa2fa8387fc1615d724814d0b58ea09db65b5941d4f67c203f0002689417d50ebce180ecad3016d38d9afe81157b82f06c14f3165a1e36f621fbd313c0b968cfa8a8b5ddec735ef0fc2aa601f7559c47a5e893dca9db883c8cde50e7c64b582e2393796066228488b0f8a07f22d52c4431dec74f7466f02254d757df06a4c775e2891f1daee68"}, {&(0x7f0000000980)="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"}], 0x0, 0x0, 0x0, 0x4000}, {&(0x7f00000019c0)=@file={0x1, './file0\x00'}, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001a40)="f2f805133e3c1eb47f6874aed7f0f1b44d4cd4f0d96a0535f3825c2dd0c23aedd2804a0ff13b6e8a2818679f73b3afc3dfa493b231a41bf770fccd486f"}, {&(0x7f0000001a80)="35054c01ca6f5027e92e61223d838c93487880ff591a4950591dde0c7cf9ec9aeea052cdcb8080aaba1366590a1bc1cb83faa4dee450a9463e08ba7ccc64c3d76a5012417295e32bcde6229bfda44641324a906dbaf6eeb70eaf6007f9858dbc5101fce30cbdd8599240d2b7cdc2a51cbacd35a463202370e6dbacd1d2963fc8dc104b67b06ce1bea4efce48dff2647eca93f201f2f5bb4d4a822ddd0e3b0a09ce7733cc0b821cae55053144bb9b4e1687f2f7c5f84956282308c3b858efa5ff2b1080527b446a6110af91661ad496b412"}, {&(0x7f0000001b80)="bd36f23c4a4185e25ab472930154fa1d27cfa738a5b7a4e55ac380a817ddcddc06f71551e635ab3bad"}, {&(0x7f0000001bc0)="f86c178966ee70c8b7bf3556e0d2406848b8b58f83f78d16d1bd50ddcd00ae4011ffe2a45b04285cfaad92eccd14aaec01b75ab5c91eb962399991fbc196a9a9bb97ab9372"}, {&(0x7f0000001c40)="242c437f04fc8d30f04970364e905fe484baa37b4203bd04d664b5f380ab2e7dc3b5075d0373f9a5d606192f7522894b0999f825555d7de52516344f2068dccbb333794eb94856eb1804fe0a09b321cca611b7ad1e557874e8ce49b350fad692d9bceff78d8c0bd3ad9fc81783bf39eb697ed64dff798721ac34dc064a3b2ba135750dc9182d0327d9afc1abdf0ffdca934a4373df12736607dc76f5c97dfa3b5eb65576e7eeeb81e0fa6126173dc9e50da02724ec30f1b1e3d6f9cc9c"}, {&(0x7f0000001d00)="fa846ece4ce8f10a281864b1fa3b6d0d0d0afa50a72f1032604dcbf3cca2ab0d7f456b28cebeb5fb8de6f0bb0f60391cdf57da63af08027c6d4bc64bf038a8e27aa03905ae7059884d4f49dd378ea11bb9f175b2e677cdc3363c4a3ba59fb74913e5dde1ffce96057c56630e0e"}, {&(0x7f0000001d80)="9ba1c18457ef0de74629d3e5b0f5cc435f6ff20340162801dfcaf519a0caaf1ad46eaf46b37d1fc03c2a46719fecdfefb3c8acb4526496abbf793c04a93eb1e44139c3e87d1a485dd5aa82d4d55b19cc2c3c36a30fa59542eee1d93f266dab127de146e05f58f6e03825167117c0cea2ba6292236544903df9f9de68eb85ca44be8b9463b2f1f7ba"}, {&(0x7f0000001e40)="6ca933ec1eea3ee5e2c03a4779a4db9cf115f3b3d075be3cc6bef2e81d1aa86bdff5649d7ebd9f7014243de3228cd277892abedef64f0528c5dd4152b7508703178bb699dfd4833d34272fb1195a3b28cd43068a8e1725dce6e2a0b551f564d8afcba75659dbee48568527df157bebcccd3233b6890664c3aae1ae0fa8045efbbe133726f6352d8e8f9801dc0f9fa0de9d04695705dcf06ab399eac0e4988a5d67c34b87d34717eeb34241ad1009ac619401fed163a95644eeb710696d0f746cbcb0d8bc749948"}, {&(0x7f0000001f40)="76c01f63efdaf8f75ea7226625618b018c8abb592331f9a802395f46f7300028b6440fe5372f1f24398d74b3710fb178ddb8780b43ad2e63c117a401ad8321f0bec4a559c12c4a2be31f559dc18be45b485cf3ad81e1e62d4194e846"}], 0x0, &(0x7f0000002340)=[@rights={{0x0, 0x1, 0x1, [r32, r18, r33, r34, r35, r36, r37, r2, r15]}}, @cred={{0x0, 0x1, 0x2, {r41, r10, r31}}}, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, r42, 0xffffffffffffffff, r43, r44, 0xffffffffffffffff, r1, r5, r12]}}, @rights={{0x0, 0x1, 0x1, [r45, r46, r47, r48, r12, r49, r50]}}, @cred={{0x0, 0x1, 0x2, {r54, r56, 0xffffffffffffffff}}}, @rights={{0x0, 0x1, 0x1, [r57, r58, r59, r60]}}, @rights={{0x0, 0x1, 0x1, [r13, r25]}}, @cred={{0x0, 0x1, 0x2, {r64, r67, r69}}}, @cred={{0x0, 0x1, 0x2, {r19, r70, r31}}}], 0x0, 0x4000000}, {&(0x7f00000024c0)=@abs={0x0, 0x0, 0x4e24}, 0x0, &(0x7f00000038c0)=[{&(0x7f0000002540)="d860e466cb2c629160249d55431b1cd0f471abdcc104fb7e4e0e9e7804c214c66fd4c6527fe9a3f95a887219f28b12b4fac705d4805d9554231d06a2b4422943dff2aab8a12d378502bef23129dd269ee93c5f77d4261f8a69dabf81db254bbc29d0a581bdaf00de062e9f8e0245048c2b831ea43b65c412d8ebde6d265e8af5aa57dc92dfae7f164578822d71"}, {&(0x7f0000002600)="3d89b1d67718b49fdcee4c43ecdb112228eea01a39e0a8e328f3929a75b02d71a54754f17991bdd89cf52e47661a08981429e884541829ceda5ca520e74af7b646355d31047d7c0c2e7682c4d24021479de897c9b920927e76b1d1aa26758adf5595edb4262ad76c2afe1d1b7fb33fe25ba13e89d324baf4ca618fd300e12656d96b296b465b991ae764b3c8bff0cf84e0532992b6521cbd30f7c91c35831c2a9df2034d5c374b076318c506fa9249a9672c753587d2553ae3226956554610cc76770065c4a3587407bfb91a1ea195b938986b5078162750b596d7cb8476391ac3239ae846a8acde3fc90d7c12cc0b08618f22dd3b08a558aab7d026b585e685fbdcbfbba15f51f8b878225284e24a67937699e478f21a7bbc14a5d2da9990c100cd35756288e463f375d48dbc0845e228b30b719b629814bc4c80bad02790bb229892c75aaf6167231bb6655b15b1ff85a2bd7868171c95cbe5efd968e27479c641eee333edd2e454e47e6afb96361f89f82284cd7bb8b19bc4e58a922716022f9a9d04d000e8afaa57014ce359d1b90483e1a82b479a60bc2441172665acd30a394f7d90a0fafb92b52d0f9d1137244034c18ac2e3d7aeefa8f37fb33a7176e582131a41667e251a596aeeb005d3e92c5bdecb912634b998a514fc363a72892be4752d547494765e530edc8d993ca8ee897519d2e9a10666b2e3ff08258006cf6664a33bd05cc876b1598469dec9c577a69460e9d8e454b7aaaa4b30ab8133a4f3ed6e0b977c84557c9681f72555ba91a64ef3256366eb929304d7d2c1947166475747d6607471ff9bb9a7195b1d3a13ff2b7275d9c6a7e0a548281167acee89367834901db6f8831829dcb47a059d68665b28c3dcd1fad7e77ff41a2907db66deea9b168a5455a7ca0c4ba49ac02a2c181ef11dfacfc30b5078e896da1017ef62b4e625a753c9d63fe9135748ad4abca203089d221f71ac635f548427f08db92de8e7b5994f02ac0cc37333f21ccd18240ce73ffc5a4886a92c6ad0d75bad5555c724272b411c1d4c6ed4ed05bf53dc54762b7f7131c56d2870435faac3da9bf2d7d1511df1041f2cb8dd9251cfe832449ceb76900b40ebdf07aecb79ab3f3d770b5803424cec1370c5c8edc564bacc0f43658432e8321a2d481af7313f18dd2b8e949bd141a6b59f1017a3ddc9f5008824934f7cb81f28cfc26f2dffe11816d2baccd2c6d17e1f02f8cd0b5cce3f64231bf027ab98730c29ea0375453b056b9ddcbeb0a83fc570ac743cfc5f0c308f724f86feae9f11a12784dd733456e2c3bfe078a17e61f2dec2b5d4fe47da95b9acda1dfd423c1faec61852f6ccc1738baa8637f5700674552acd5beaba467a86dbb2b6636e4bebc79197569b4af44c67b528dce828ac05a088f610c3a1905f3037fef26bc18bfe415f6394399ad9ca8d2bd106cc7a6cc37a9b370d5597ce030e5c7d99b528cce0ad13ac6b1704c8b46b455fde52f4b5259955cdb8b39f63d79b1b429d7e38fbe591286dfb03604f8f9e413d98d919a846852909d6b434da2ea25245617e3cd8a858989f183d24e4985c642c5f63ab442ed181542b4df6c558bfaa33a4a5b61a8928ca4e29788c90723252912688a430edefa3aae228cbffcdacb99001211694d258748346fd90d07277e7b926e6731f9eac5ace9d39906f6ae2ee3155516825429827eac63bab3664cc32e16b3ab33bbf37d7a2ccccfc6a29dae7d24a14c66ade5bd51ee885f196ad597177c841b7c3f2b6d3dd3cf15b74216585a746d6b7ebb75518718cebd3b87fc2e41d2499bf8a623d2a73bbdde6e4966c90346e29eceb1926daefbb3446258730f7443233052b78ed7187e05d34d1e0d9772d9edaad3d3ccfc5c09e8f0f4cb82d624069c9c055183100fc5a01c2b32ce3146dbc0a0bde166ef56d6980770e75207924967f6f41f7d51176316a0c0d16ddf950a2ef6eeb2f0dd8301fa5f83603d0ca0237e6f1a32ef9ed933befdd465c8276b8165870d64b1a38bda21368e4ddf83a4e2bd263bd4971698c2724c686d1fb9b7a09a29e93476e6ec9fb9d1aa9853d9dbb031b23e6454491f4f6230aea9b87e7230917d22648e822da18120802d5c7b6a682f3538bdb8bd0111b479122251fa8f77676e0c9641a3bb05071483e38e045fe49c438aac97a0aed6fd4c669722c9d021b67d5de3929557d69879e597041f3c82adf2f604144f435d9757bc0ac63e3ada8a07ef1f20985c7222a52803896025315c686b3ddc4c5d6843f1f6e7cef2c54ab2b55be9677959435f4db8c4058b51b393776ce59b1a602c2014f7b1dd29d13dabf4b50ef0a817c8e3532c1785c3dd7a297a4948585db90e4be08d0d11e1268816fe1d7355666e9979c3e6ce49dbf0f922f01b75c74240e72d6ed9786303e9ccd68aa0c15e21181c94c085fe33627fbdeb4e7cc64c9c29a17f262726830704160ba36ac0f0f93ba6c82b37c1ded180dacad47c016eb920403e312d5ae8f57b7c7998726e4500f160eab1804990dd8cfdee9967f75bfe9d9eae1e0b22126129a4fb1ea7a43f165d1291a0a2a35a40d083ccfa2951510cb224965f1c83357133ddcf0490ebc1663dcbacb0c28191ddbabee606370a7c6e7c2b97e9f74e5be3d482accb23e08f63652c158f79f30610c50ee6bb6b7fcc1eb50711bd871f9d18c2444262290f533a061370826d7ac1417d046dfebc33e609161dac206129aef89dbb150d4e0634a457920f30ac0fe345e7c3141c5fa093552c1eb594f6a50f90b7c1a9d0e182651e18d8fe9e563b80054d51b3caaa2e1265842ebd55a1f3ddc86caea4ca017d93df9e23f102865423332a728525d65a6fda3cfa949c90ffe94a62f661d8492db4fa934186cc7efcee9dd838a2b56d1984ddc363bd532eaff3587e1727c7cddeee489e576048b66efbee215b673982fbfd5e55bf43305a5b11cc816200ff5ea7e37ebe4345167c68fe9fd9631307c25998c287e244cee3147c2155122cf29c88be277383301bdd7542bbc860d62777cb813e3a52787c16accce6328b7c449efe0513e54d8107549b2ec99b603748663d4ea697ad7b3c8d23a8fc1bf70c4d0decdc327b48c2d423fa89d439ea23803b2a52921c9b8406286af2a890aa886005c729fc988b5c6e690c2061544b3906c68c9cc54a38fde64023556132e94668d99ad63a3e6771e96d27b7ab329628fe1269cb5cedda047e1f984559cb417092992bb0de73a6be8b6aeadbea4385e68d5e007ff5e1b0b06034e1f0c85abec35386cb3a9cfa58344351620273065965949e1a6b17ea1d7d976f3965fff42d0ed20a83f538f52dea8af2393ca2a74c467cf0cd6113cefc746271556e7a1c530b8566175a8a3372a3c50873e2091f33bb84f9f8874bb611914b3defe66c60c38f8ddba6d1de50dc031b2f60edad6a0f7595a5f00ac7388bacad9a8a0c62a76a74d82437a37c72446e3dbe2f0163ab020d43578a4b486e1322ba128fee6e56d6b55760ca8db7be221b0df93e8bc7a77765e3efc1e5def3ba38e38df614e2a596bd621629c6a2e8cabb5b511174c265a0e8029cbf93ec47ea97e3031c20456657937704470e22eeed1aa08df2de3d2cdf6dd0433c70eced294bb5207a8b83abed66d80fb32e88ded04f169bc4e74e1a0e797d719930cebbb7add6372f2a6f21ab23771231ea093bdb1ff3fb927c90727952d52c7a5e322399ca7b7aeb839f9909148faaa5b7f46545b8f36f5ff336b2cf18789eeaf52dfde0c5c2650bcc6010370b8953d8311593265a47ba39ce07c7c7fd0279c8f5279da40c6d76313d7f0f6b0ed44d897ec90a8da229169929e5d5ba624721ccfa2b5eb70341523a405675c80499dc05a1cecbae2f002f654ba6df3cfe2d12e1f8c81a26ae31aab614ce5323cbf4e1f4e5cb2c84c19d7eaccfb052dcdf13af54c05e5063f7488f0a0d80c971fdf5ef78f21f351abecbed9ce05a2f89d7ce9156d92ace62e3331b809b6ee7a54f63977d2919684997a4b150dbdfdee4f43d549c8868c1ccc69f49e1262a376067531847d37f363d911b0deeca5d054aa945d0dd8ec7e330593f9c40fc37d1f31bfc00ed48d1d8e215356656c5c7258f9662801aaba9a525a5fdd560284de586129f43d987ef7622341724778ec2c985db9993cee01b3300bdc9811039c234c6aa07867ef1fa55782f0e96a2e3d4bb55e7ff91ae9d3db58ef0138e75034648e14fd85e8c473d9df28c1bc534336f8a314cfe92535167e06ce96ce015c1ac7a5ebad9d3e4c059942d41cd9298537ecdc8c961f4fcbc2e56d9326c178b1f671ac7a5035b52c13292bea1a567907db892c6b545703ab1502267c4c15bcbfb4720d4d138891f1e974ce970ec61975842e64d992f357d5c2cd3a12d159ad63371668c470a571b4f71337d2827b0beb38bcb1f630402ac342b59ce2094372e2420b498b1ad8cef007db4fde0e7226a7e19173fc36f2881ca260b249745afe1ea71b49c579625bea37a79f43c41b2ccbe424c6ef394388498439724086b365ed6a07ded0ceddb8dc81bf65304b95c0da0ac4b87abd671e4b125941fe3a9fa1a427ceddfe592a559a302737e826f7371bbc6055159dec343aa451e63c4f12791a453a685baa0c6c378e48e3aa4a396be1d997477613492c91c5e0da08ab80ed00762e9dc9d06eb63b5c6bc08f248f54160f5218d0ed6c0457e2ff9a60ff3dfb7e6f3809760915b22098cfe5167f4369772da842f01f42a81d738cdeb1b1ba27665ab66a2428b141b4878a1a53eabc26a86865e45aff65f27799fd52ab5b731be4f8d0dc905527d04cb7936088a1e31177853ba8c6753046609cee09820fc77cdd955ce56a35aec41ab326f92c958968bb1c966a8c9bc22be17654740938632d8f6e5a2b3c20bec0bf3de71284f064a00bbebfb1722ddcb5a55ab5c5f8290fa583582af6783bcb3cab69a07b9454a00cfe177fc744275bd40f34828297c67cf9bbfa14c27f0adb84b332077528af968a6646dd9822f4e6fb6deabf54c0435b3c08052601e7ef7b394c361d63cbf216ae2a4c2c8d1cc3eb588917b55ac1c70ce0897a9d661556d5317831c1275c1d53813277124cd85f2e4bc89e9e9e7ce480a0833ed393ef8d5d8eaeb7b560fb8bdb405f5336420043777d0499f41e4015626e1d1a15e03590b49206a1c5e76d02d47af76e243c31e858d3e64fdd0fad9d5ea3c6ea9389bb4f062130d56a851749293c000cfa36785d8d8386e7ed39cb8642eda0d1855bdb320d7722f5ae26f684434e664c20515c7d4b820375daca1cc76347e216074bcc4bfcccbc80a993d36a4fb68614cc262d6ac3e8de0b1beaefef53beb319604540a782450bb7d4c646b2f247dee0c104fcc2922508eca447fbdb1484f56d25ae66ffadc37c2d4fef9f56033647cdbea0be4f0dc64ba5781c9d6a93bbd5f82a2ae647188588b14e9d80b9ff279cead0b304018b10d5c918fe766e966dc66ce06df7e5cc66da118249e8b55062791a8649a739b9ef548e91bd0c7b78dbb68ef000136ff9b3da6f5a8443cf69797d6f32e5cda1950c74053b25e7abfe53e92f789b45479a786cb635f38ef107d5d06e2d83a8fdf72494bcb41b37d2709097b7761e5e299f410a1102402488aceb5606b6e05a41258510204759816aa028473628b1a6844d983996d6626bffd8dacd1dbecec0fc925d69ab8a2ca39be62d4ce3fa365cdb2fde9b0505477f79580edb4a84ede103d264bc5f2bdefeaae082b6380cfd24ba835262f0ff2838607b1f42"}, {&(0x7f0000003600)="dc43b5531e32f24718aefb878f71c336dc8a8bb92fec200d713e7692d255c06f51411b28ba0b33e564fdb3bb22b1ad4fbddf853e42dc3e40ad0df9fcb3a4040262dee039509966428d44f158679f1c6d382272062571f15caf2329a227e31b0cc3ffc883ca90ca1c4b4fb0f3f31ad5473ca3d30d3d362d98433a2c30cafc7c51fb739263170a55b1d70f918a14a3021d10058ca6db491daf"}, {&(0x7f00000036c0)="d0e3cdfa7762d6a7a4dbff30425586f6c905"}, {&(0x7f0000003700)="700fd32b26d508b55c55e497966c725999ff5733e816a58400c9a29fc560a67a1dc61ec232d430a276cdd7e639461a7294e95eb5c6883fd1cec167f8e060a55f20ef7af5596a86226342f947ced68a687a703d86c83cba1bef9ba85e364a00ebe3d81072d3c8c6c6b26865829c5b98f1a0a0726ac54bd610fcc4fd2aac339b0016d38727df8fd17a985745919be3b5a91250058e2ae6243a1cc291ee6ad8526b0110a15d67a0890599907b39252540dabd45e9beab9e8d8fc743dfff9b520d0253db855134192d4ad54b774dddc3cdd949c7b4a9d75634a407d9a7f39daa697336c7d96c7599543e662871"}, {&(0x7f0000003800)="eda956caf5e1346d07292b1fedc95ed3ce0ee65b89821335837312bf0073383851b48d051b483162fbef605aa8cec70f07b7a03478c3ea1d093475079f730df3e44e7715ebb37fe6f06774e65d6e9db065789c342b69c7c8c963597aadbefe964000a045748b15a1c4078c036a407df68831ecc708761c9e9f261ac876757bf418c0e87635791d5ef469619896b1669691f4cccf7e0e70ca9255"}], 0x0, &(0x7f00000039c0)=[@rights={{0x0, 0x1, 0x1, [r71, r60]}}, @rights={{0x0, 0x1, 0x1, [r72, r73, r42, r58, r74, r75, r76]}}], 0x0, 0x20}, {&(0x7f0000003a40)=@file={0x1, './file0\x00'}, 0x0, &(0x7f0000004bc0)=[{&(0x7f0000003ac0)="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"}, {&(0x7f0000004ac0)="6a843feda5bfeae97cd3dc082221d2f2954d22ef177ee631e4aa73fcd20ad4a60fa6a0bbb064f904eb31c1f1a0eb32c0e9f476bf42e22fa0b488c8f70a61017427712c7b8df6d894ea1a92e85a08ec32e16718904e057671319f89410d0eb796ee05c4227286156df7e26129c5501f27d6755fdc5f89243d3801634a667347f75f2c5b1381cd7d133f9e66ed668255685a61cb6666332c67519904f8199b2aea9988750d54e3267eb47d7e2356dc4bf0149845fa730777a98ba058bb1bab906609b7c4028cff02190f21730ad065e009721d1f7713784328720e832ce2d81bb468827453"}], 0x0, &(0x7f0000004cc0)=[@cred={{0x0, 0x1, 0x2, {r83, r85, r87}}}, @rights={{0x0, 0x1, 0x1, [r88, r89, r16]}}, @cred={{0x0, 0x1, 0x2, {r93, r30, 0xee00}}}, @cred={{0x0, 0x1, 0x2, {r97, r98, r9}}}, @cred={{0x0, 0x1, 0x2, {r64, r100, 0xee00}}}, @cred={{0x0, 0x1, 0x2, {r19, r102, r103}}}], 0x0, 0x44001}, {&(0x7f0000004d80)=@file={0x2, './file0/file0\x00'}, 0x0, &(0x7f0000004f40)=[{&(0x7f0000004e00)="dd24a725bcd529f96ac196c7ef15279853e833f01a3f6d48ca51e7caaa3a734724d4b72fed632351bac7c0cf7c1ff30a45623bd1fcff4dcbc71e218864397b8364901054"}, {&(0x7f0000004e80)="f8d11e1ca9b842dddbbeef54af4d055822648e9609e64d19d5652511268f9b7fc9da83200d720b70548050883a517fdcbcfc1d9138b03ad2ea120378c8ae2153ea08ef71fae16dd5ff2ae7d7e96a20ae045c536bf7a718229646d37ea0f75069ab4218fad4273c118a3cffbc4222fdcbf5088bda0df8fad57058ce432fb3122d411a8cd90f808f"}], 0x0, &(0x7f0000005000)=[@rights={{0x0, 0x1, 0x1, [r104, r105, r34, r52, r106, r107, r58, r108, r90]}}, @rights={{0x0, 0x1, 0x1, [r109, r1, 0xffffffffffffffff, r110, r49, r111, r112, r113]}}, @rights={{0x0, 0x1, 0x1, [r114]}}], 0x0, 0x20000000}, {&(0x7f0000005080)=@abs={0x0, 0x0, 0x4e22}, 0x0, &(0x7f0000005580)=[{&(0x7f0000005100)="b88c55dc1a304ca81ae797c12b42d688c229f76a3c4ba80164927275ae443cda16ef147466fa0906f7776260406c4a0e6650950d85916ccc65743744953222bd4d9fc6ed0d60afd84b5261bc81c27014947221d5fbab4d6b9aeb22d3d9ebaeb4fb49aa4dd3d930e5e82aa1b5bb866ed8828162aa0d1df4be4e7a"}, {&(0x7f0000005180)="9fa8f60e0065d5731d7fbcf0941183bc71178552ed76bb4922d134cdfc5d006a049900fb430d3fc982cdd7ff7b228c3fa4f81456bd2e38a6961404c4be29aea75ff88b92fe3ac57eb6eaba6b2d1a645ae98e174d9fb19c31bf296bfc312602dd69197833987037b2056ea280cdf115e957b091a7b10763c691acb628acbc71cd07b2"}, {&(0x7f0000005240)="6bdd8e7fc0b092cb5097d92f0a6d3ce60292fd82989216937d183ed5381ff7f880608ad4bdab86cb1826efea9be97486dc12c3545325988ab1"}, {&(0x7f0000005280)="2a6824548bf6dedbeda928e15b2ca6c902d14cff50f91992472a046b0102aaa5e5ac1da08db0e53917"}, {&(0x7f00000052c0)="2dda7bb36aff6b5f7f564628db04582cce9a9aa72fad8b81fb4b6aebdc64811de0c5141c11dbe235100312789a8ca7696700afad7e7ac8082bf4370f40ff282649f4fc14ce30fd40fb3888420d7d089934bebfc2d6606ad8ec"}, {&(0x7f0000005340)="f9bf731cbf5a4fa9eaa1e9dfce1fdb5408afc473861e5ff9f21e7882b7e0d0178b6186e73cbc9d1722d41617a6f198c43014e9606006c999e304448edb31870e5521b22c0bb816da1829e68c7575dca10fb9a292ceda9bcdf1ad6766f5f4ddaf20fc789c8d8442eab294e3bcda0f98f13dd88768a0c31e"}, {&(0x7f00000053c0)="29c8e35c9317ebc79cae4032637bb377cf0625a91cfcfcc33116d3c7e0bc43bb5da1db6b2a653b61119b2c2d44802da7d6150acafb8d3b7bd1f0cedc1fb78e81ef7fd3e551502fd27cba8d0f07e4b596fe208f80dcd6b741d9b86276f837d95e7ba9221e64c150e6de0926e9c31fc113ece9dd26a0847adbea4afa22e0aac9ca7aa88dce12b927f5a8aa4ff0452d9a59e1cd82fac53135483ae31a41faf8a0f8a14fb4413c5b11f944d6f7438f777f440bef3d0103a24c585ee3e8a6c136181e1824577073669c2f900ced9f"}, {&(0x7f00000054c0)="3ac173c781c89c1319dfdcdbb3180f66aa282052f32cc75c7ae6bdf629c32ae43e4d190326b4071a1d2e9e9f6aee5c62e62d53f38c140793bea5787d8a1bcfdc8f7e302ba9ed40cd1374591f0d3915bcf3b13be3b328ddad8f8e81adacf7eb2a80a15f34d9edc3f852f58fb36b027da0249f5776959eb939c146e916bec7baa00308cc92973aa475c75c2ea52638314ddaea89176d5bc980df2235e5093ffa08265ecba23cb0aceb5452e00bd08e"}], 0x0, &(0x7f0000005600)=[@cred={{0x0, 0x1, 0x2, {r7, r116, r118}}}, @rights={{0x0, 0x1, 0x1, [r23, r119, r120]}}, @rights={{0x0, 0x1, 0x1, [r25, r121]}}], 0x0, 0x20000000}], 0x106, 0x89) syz_read_part_table(0x0, 0xaaaaaaaaaaaab5b, &(0x7f0000000080)=[{&(0x7f0000000000)="0201540000000a000000ff0700000000000042000800000000000000004000ffffff85000000e1000000887700720030b5829237c30000000000008000da55aa", 0xfc3f, 0x1c0}]) 04:45:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x9800, 0x0, 0x0, 0x8, 0x35}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x290}, 0x3e) [ 162.885893][ T8630] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 162.911425][ T8630] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:04 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) r6 = socket$inet(0xa, 0x801, 0x84) listen(r6, 0x0) socket$inet6(0xa, 0x801, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x5) dup(0xffffffffffffffff) [ 163.122098][ T8640] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 163.158615][ T8640] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 163.184490][ T8640] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 163.217848][ T8640] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. 04:45:05 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) r6 = socket$inet(0xa, 0x801, 0x84) listen(r6, 0x0) socket$inet6(0xa, 0x801, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 163.247157][ T8647] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 163.256022][ T8655] mkiss: ax0: crc mode is auto. [ 163.262310][ T8647] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 163.287444][ T8647] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 163.310249][ T8647] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. 04:45:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x9800, 0x0, 0x0, 0x8, 0xf}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x290}, 0x3e) 04:45:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 04:45:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000100)={0xfffffffffffff801}) 04:45:05 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) r6 = socket$inet(0xa, 0x801, 0x84) listen(r6, 0x0) socket$inet6(0xa, 0x801, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 04:45:05 executing program 3: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030304c0019043f3581bf64da30846c9324e98236d2c477451d010bbbc40fe4796697bb46bfdeeabd1054643c7203c442e4d8d4bc43846d3dd7e3d9406613962cb9b2ec2c1da6d4a6dfffa184e0b480b678744bda61d07a73aabd2aa40c4013197e2dbdc10ed3f92afd41507ea43fc7aa31af42967a2d0c2a082816a8d214d21b22e5ef0f"], 0x15) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 163.613164][ T8682] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 163.652936][ T8682] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000100)={0xfffffffffffff801}) 04:45:05 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) r6 = socket$inet(0xa, 0x801, 0x84) listen(r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 04:45:05 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) getsockopt$packet_buf(r0, 0x107, 0x6, 0x0, &(0x7f00000000c0)) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 04:45:05 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) socket$inet(0xa, 0x801, 0x84) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 164.017874][ T8697] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x6db6e559) [ 164.082065][ T8697] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:06 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) getsockopt$packet_buf(r0, 0x107, 0x6, 0x0, &(0x7f00000000c0)) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 04:45:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r0, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @random="c0441d4f2c36"}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x1, 'teql0\x00', 0x4}, 0x18) 04:45:06 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) socket$inet(0xa, 0x801, 0x84) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:06 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) getsockopt$packet_buf(r0, 0x107, 0x6, 0x0, &(0x7f00000000c0)) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 04:45:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 164.541475][ T8725] llc_conn_state_process: llc_conn_service failed [ 164.581306][ T8729] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. [ 164.615450][ T8730] llc_conn_state_process: llc_conn_service failed 04:45:06 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) getsockopt$packet_buf(r0, 0x107, 0x6, 0x0, &(0x7f00000000c0)) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 04:45:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r0, &(0x7f0000000040)={0x1a, 0x337, 0x4b, 0x4, 0x3, 0x7f, @random="c0441d4f2c36"}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x1, 'teql0\x00', 0x4}, 0x18) 04:45:06 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f, 0x21009, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8}, 0x0, 0xfffffffffffffffe, 0x6, 0x9, 0x8}, 0x0, 0xd, 0xffffffffffffffff, 0x1) prctl$PR_SET_KEEPCAPS(0x8, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$kcm(0xa, 0x2, 0x73) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000280)={0x34, 0x6, 0x0, {0x4, 0x5, 0xb, 0x0, 'clear_cache'}}, 0x34) setsockopt$rose(r0, 0x104, 0x7, &(0x7f0000000000)=0x7, 0x4) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000002c0)={'bridge0\x00', {0x2, 0x4e21, @rand_addr=0x8}}) r3 = socket$inet6(0xa, 0x803, 0x3) fspick(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x1) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x9, 0x0, 0x0, 0x14, &(0x7f0000000480)=ANY=[@ANYBLOB="636c65787254021221f45f63616368652c656e6f7370635f646342ebd92c00"]) r4 = geteuid() ioctl$TUNSETOWNER(r2, 0x400454cc, r4) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000003c0)={'bcsh0\x00', 0x29ac4dfb05627dcc}) r5 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video35\x00', 0x2, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000400)={0x0, 0x80000, r2}) ioctl$DRM_IOCTL_GEM_OPEN(r6, 0xc010640b, &(0x7f0000000440)={0x0, r7, 0x100}) ioctl$VIDIOC_QUERYCTRL(r5, 0xc0445624, &(0x7f0000000340)={0x1, 0x8, "3f3d4e9ee72ab7a7c638064c4b029df5afd35b4ddca0b15e1f0e93e6609efdee", 0x37, 0x0, 0x1, 0x5973, 0x2}) 04:45:06 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) fcntl$setpipe(r2, 0x407, 0x8000000) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 164.745081][ T8740] llc_conn_state_process: llc_conn_service failed 04:45:06 executing program 2: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x17, 0x0, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}]}, 0x28}}, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000040)=0x0) syz_open_procfs(r5, &(0x7f00000000c0)='net/ip6_tables_targets\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) socket(0x10, 0x3, 0x0) 04:45:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x6db6e559) 04:45:06 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:06 executing program 5: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x165801) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xf, 0x0, "1252ae44913c570b3a476a46a9a5ce6dd6a467f7b883d36c7318f7948500000016be164b38b15a21560c0100008000", "83146c1555916e26a3ee100289ec76e17258339383003f4983dd36c4911ef85cb264098aafcebd44cd94000000000000000000000000001100", "ef25ffae0784b76699ebff00"}) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) wait4(0x0, 0x0, 0x0, 0x0) 04:45:07 executing program 2: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x17, 0x0, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}]}, 0x28}}, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000040)=0x0) syz_open_procfs(r5, &(0x7f00000000c0)='net/ip6_tables_targets\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) socket(0x10, 0x3, 0x0) [ 165.002619][ T8768] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:07 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x6db6e559) 04:45:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x6db6e559) 04:45:07 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 165.515191][ T8795] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:07 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) fcntl$setpipe(r2, 0x407, 0x8000000) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:07 executing program 2: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x17, 0x0, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}]}, 0x28}}, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000040)=0x0) syz_open_procfs(r5, &(0x7f00000000c0)='net/ip6_tables_targets\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) socket(0x10, 0x3, 0x0) 04:45:07 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) gettid() perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) 04:45:08 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 166.037230][ T8828] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:08 executing program 2: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x17, 0x0, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}]}, 0x28}}, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000040)=0x0) syz_open_procfs(r5, &(0x7f00000000c0)='net/ip6_tables_targets\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) socket(0x10, 0x3, 0x0) 04:45:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:08 executing program 5: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, "1252ae44913c570b3a476a46a9a5ce6dd6a467f7b883d36c7318f79485d81d1e0700000016be166266f24b4917affda8404b38b15a21560c0100008000", "83146c1555916e26a3ee100289ec76e17258339383003f4983dd36c4911ef85cb264098aafcebd44cd94000000000000000000000000001100", "ef25ffae0784b76699ebff00"}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) wait4(0x0, 0x0, 0x0, 0x0) 04:45:08 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, "1252ae44913c570b3a476a46a9a5ce6dd6a467f7b883d36c7318f79485d81d1e0700000016be166266f24b4917affda8404b38b15a21560c0100008000", "83146c1555916e26a3ee100289ec76e17258339383003f4983dd36c4911ef85cb264098aafcebd44cd94000000000000000000000000001100", "ef25ffae0784b76699ebff00"}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10010000000036) socketpair$unix(0x1, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 04:45:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:08 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:08 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000003100)={0x0, 0xfffffffffffffffa}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x7a47) openat$zero(0xffffffffffffff9c, &(0x7f0000001780)='/dev/zero\x00', 0x400, 0x0) r2 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="487b1c4d2c2da386c3b08db047092ed3da5bddb113afc0fac0985babbd35f0a2aaf5bbf7cc4a1d23b6eb6225510000000000004f59761c71b63b914973ef1e67bcbe2b81fbe6c96bce49cb37a68e8c025a982b", @ANYRES16=r2, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x40000c4}, 0x40000) recvmmsg(0xffffffffffffffff, &(0x7f0000000b00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000340), 0x4) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000003100)={0x0, 0xfffffffffffffffa}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 04:45:08 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000080)) 04:45:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:08 executing program 2: ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000040)={0xfff, 0x3, 0x2, 0xf5, 0x1, 0x16}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x2081dc) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x3000)=nil, 0x3000, 0x800002, 0x11, r2, 0x0) madvise(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r4, 0x2081fc) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0xfffffef3) r7 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r7, 0x0) read(r5, &(0x7f0000000000)=""/250, 0x128b9372) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0xff, 0xfb, 0x80, 0x0, 0x0, 0x4, 0xdc5a5180dfb2a11f, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6e, 0x7, @perf_config_ext={0x7, 0x4}, 0x20620, 0x9cc7, 0x9, 0x6, 0x3, 0x1, 0x4}, r8, 0xb, 0xffffffffffffffff, 0x4) fcntl$setstatus(r3, 0x4, 0x6100) getxattr(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r9) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) 04:45:08 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000003100)={0x0, 0xfffffffffffffffa}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x7a47) openat$zero(0xffffffffffffff9c, &(0x7f0000001780)='/dev/zero\x00', 0x400, 0x0) r2 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="487b1c4d2c2da386c3b08db047092ed3da5bddb113afc0fac0985babbd35f0a2aaf5bbf7cc4a1d23b6eb6225510000000000004f59761c71b63b914973ef1e67bcbe2b81fbe6c96bce49cb37a68e8c025a982b", @ANYRES16=r2, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x40000c4}, 0x40000) recvmmsg(0xffffffffffffffff, &(0x7f0000000b00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000340), 0x4) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000003100)={0x0, 0xfffffffffffffffa}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 166.779404][ T8853] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) 04:45:09 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000100)=0x53f) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) [ 168.839723][ T8898] IPVS: ftp: loaded support on port[0] = 21 [ 168.896658][ T8898] chnl_net:caif_netlink_parms(): no params data found [ 168.981561][ T8898] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.988756][ T8898] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.996759][ T8898] device bridge_slave_0 entered promiscuous mode [ 169.005278][ T8898] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.012409][ T8898] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.020367][ T8898] device bridge_slave_1 entered promiscuous mode [ 169.036904][ T8898] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 169.047571][ T8898] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 169.064218][ T8898] team0: Port device team_slave_0 added [ 169.071308][ T8898] team0: Port device team_slave_1 added [ 169.125645][ T8898] device hsr_slave_0 entered promiscuous mode [ 169.163132][ T8898] device hsr_slave_1 entered promiscuous mode [ 169.232834][ T8898] debugfs: Directory 'hsr0' with parent '/' already present! [ 169.304822][ T8898] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.312083][ T8898] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.319829][ T8898] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.326918][ T8898] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.358893][ T8898] 8021q: adding VLAN 0 to HW filter on device bond0 [ 169.371224][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.380295][ T3015] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.389364][ T3015] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.397605][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 169.412901][ T8898] 8021q: adding VLAN 0 to HW filter on device team0 [ 169.423044][ T7959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 169.431330][ T7959] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.438399][ T7959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.449867][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.458259][ T3015] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.465325][ T3015] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.482322][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 169.496242][ T8392] device bridge_slave_1 left promiscuous mode [ 169.502558][ T8392] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.556512][ T8392] device bridge_slave_0 left promiscuous mode [ 169.562771][ T8392] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.203331][ T8392] device hsr_slave_0 left promiscuous mode [ 171.242981][ T8392] device hsr_slave_1 left promiscuous mode [ 171.300596][ T8392] team0 (unregistering): Port device team_slave_1 removed [ 171.314626][ T8392] team0 (unregistering): Port device team_slave_0 removed [ 171.327187][ T8392] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 171.387560][ T8392] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 171.507461][ T8392] bond0 (unregistering): Released all slaves [ 171.690249][ T8898] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 171.700949][ T8898] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 171.714253][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 171.721991][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 171.730685][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.739135][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.747824][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 171.768660][ T8898] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 171.776041][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 171.785127][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 04:45:13 executing program 5: ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000040)={0xfff, 0x3, 0x2, 0xf5, 0x1, 0x16}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x2081dc) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x3000)=nil, 0x3000, 0x800002, 0x11, r2, 0x0) madvise(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r4, 0x2081fc) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0xfffffef3) r7 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r7, 0x0) read(r5, &(0x7f0000000000)=""/250, 0x128b9372) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0xff, 0xfb, 0x80, 0x0, 0x0, 0x4, 0xdc5a5180dfb2a11f, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6e, 0x7, @perf_config_ext={0x7, 0x4}, 0x20620, 0x9cc7, 0x9, 0x6, 0x3, 0x1, 0x4}, r8, 0xb, 0xffffffffffffffff, 0x4) fcntl$setstatus(r3, 0x4, 0x6100) getxattr(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r9) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) 04:45:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x4) 04:45:13 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:13 executing program 2: ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000040)={0xfff, 0x3, 0x2, 0xf5, 0x1, 0x16}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x2081dc) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x3000)=nil, 0x3000, 0x800002, 0x11, r2, 0x0) madvise(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r4, 0x2081fc) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0xfffffef3) r7 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r7, 0x0) read(r5, &(0x7f0000000000)=""/250, 0x128b9372) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0xff, 0xfb, 0x80, 0x0, 0x0, 0x4, 0xdc5a5180dfb2a11f, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6e, 0x7, @perf_config_ext={0x7, 0x4}, 0x20620, 0x9cc7, 0x9, 0x6, 0x3, 0x1, 0x4}, r8, 0xb, 0xffffffffffffffff, 0x4) fcntl$setstatus(r3, 0x4, 0x6100) getxattr(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r9) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) [ 171.930256][ T8916] validate_nla: 5 callbacks suppressed [ 171.930263][ T8916] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:14 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 171.987078][ T8916] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:14 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:14 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') syz_open_dev$vcsa(0x0, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) [ 172.376187][ T8945] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 172.402864][ T8945] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:14 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000600)='fd\x00\xa9:\xb3t\xca\xbf\xa2\xe0\xf8\xfd\xfb\xb9\x12\xfcT\xf5\x80\xc0\x8f\xff\xc7\xfb\xee\"\xa1\xff\x87\x87x\xd9\x0f\xa7\xbe4o\xc0\x82\x98\x94\xe4\x9c\xaf\'_L\x05\x02-\xfd\b]\xbe\b\x00\xb9\xc7\xe6\\\x98\xec[V_\x04Q\x869\xfdk\xe1\xf5M\x93\xef\x1a\xfb\x9ad]l\x93\x11\xe6O\x19;7f\x99\x8b\xa6\x0e\xcc\x8dw\xa1\xdb\xbc\x93\xa6i\xc1Xu\\\xf2V \n\x1c\xa0pM\xec5\n,\xe9?\xce\xbf\xb2o\xd5`\xba\xf9\xff\xa3\x88\xbf\x1b,S>\x9d\x90\x9f\xfd\xbc\xbe6i\xe5 \x9b\xb6\x99\xbb\xee#?\x81D\xcf\xe14\xdc\xec\x9a\xb7\x00\xe6\xdc\x1a\x83\xc0&\xc95\xc6%\xa3\xb8\x82 y\xcf\xcfz\xd2\x88\xa2,y\xbaE\xc4\x81\xa4Fn\x8c\x8c\xa1\an\xdd\xc9_\xb9\x11o\xe64\xdd9\xfa\xf0\xa3\xc9\xd2A{?>\x1e\x0e\xce\x99\xaa\x17`*}\x84\x8b\x1a\xd3o\x1d\x97\x83\xaeN-\x19\x15\x9b(\xb9\b\xce\xe3V\xd3E\xee\f\"\xb0\x88\x86m\xcdq4\xc6\xa1\xca\x8e`\x9d\xeac\x1f\xb0w\b\xaaX\x98\xd1[\xc7k\x00\x11\x8e#\xd8\f\f\xe13S\xd9?5K<\x13\x91\xf1\x8a\xc8\x12\xc8\xe1\xbc\x88\xcan\xb2\x04\x18\"\xd1Lg\xd1\xdb\xd3}\xab\x06\xd5\xad\x19\x9aCs+\xb6F\xae\xa5jn\x8f\xae\xa5\x87`\x04=+\x8b,Gr\xfcuh`\xc0\xfe\xdb Z\"\"[\xd30S\xf2\xc7\xf2@\xd9{\x8b&7\x84n7SCf\xa9\\\x18d\r\xdd\xbe^\xb8\xd8\x03Fi^\xe5a/\xba\xe9{\xcc\xea\x7f\x84b\x01\xda\xa1\xee+\xd2\x89\x02\x9d\xb5e>\xbe\x15\'s\xb9^\xd6{\xdb\xa2\xb5\xd3\fdC1\xb6\xdf\v\xae\xa3\xff\xaf);W\xe0\xb9X\xcbv\x0e@\a\x10\xc38l\x82r(\x19\x80\xc6\x83\xefT\xd1Xz-\xf2\xef\x9a\x14\x03\x86\xe5\xcc\xba|+\xd8\xb4\xda\xf6\x9a') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 04:45:14 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:14 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') syz_open_dev$vcsa(0x0, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r1}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 04:45:14 executing program 2: ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000040)={0xfff, 0x3, 0x2, 0xf5, 0x1, 0x16}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x2081dc) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x3000)=nil, 0x3000, 0x800002, 0x11, r2, 0x0) madvise(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r4, 0x2081fc) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0xfffffef3) r7 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r7, 0x0) read(r5, &(0x7f0000000000)=""/250, 0x128b9372) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0xff, 0xfb, 0x80, 0x0, 0x0, 0x4, 0xdc5a5180dfb2a11f, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6e, 0x7, @perf_config_ext={0x7, 0x4}, 0x20620, 0x9cc7, 0x9, 0x6, 0x3, 0x1, 0x4}, r8, 0xb, 0xffffffffffffffff, 0x4) fcntl$setstatus(r3, 0x4, 0x6100) getxattr(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r9) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) 04:45:14 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') syz_open_dev$vcsa(0x0, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:14 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 172.907493][ T8964] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 172.922877][ T8964] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:15 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) 04:45:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) sendmmsg(r0, &(0x7f0000009280)=[{{0x0, 0x0, &(0x7f0000002900)=[{&(0x7f00000005c0)='o', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYRES64], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r0) 04:45:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:15 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') syz_open_dev$vcsa(0x0, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:15 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r1}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 04:45:15 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') syz_open_dev$vcsa(0x0, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {}], 0x2, 0x0, 0x0, 0x0) 04:45:15 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r2, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 173.324758][ T9004] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:15 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) socket$inet(0x2, 0x6, 0x2) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) r1 = socket$inet6(0xa, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f45874600000004b1d1000000000000add2ad015e0d00c42d000004f6ffffff00000020259eb8d19e00004000000000000000000000000800057eef0052040008000000007e9f00030000feec06be00770096ff0000008104d759ade57a9715d59ce0e0a835a4d6b9fe56447cb80474f9ed4f0600000026d0ea4dba20c687b44020e148cf81be4fca8a40d6d1de3e5b8ee8006559012adeda552401b4cbfb66352cffb6bb9624b482c6413caa253ff7889f33a2b233677c5e00"/201], 0xc9) recvmmsg(r0, &(0x7f00000085c0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/226, 0xe2}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.swap.current\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) write$cgroup_int(r2, &(0x7f0000000000), 0xffffff6a) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003e40), 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet(r0, &(0x7f00000012c0)="03", 0x1, 0x9, 0x0, 0x0) [ 173.379987][ T9004] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:15 executing program 2: ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000040)={0xfff, 0x3, 0x2, 0xf5, 0x1, 0x16}) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x2081dc) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000004000/0x3000)=nil, 0x3000, 0x800002, 0x11, r2, 0x0) madvise(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r4, 0x2081fc) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0xfffffef3) r7 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r7, 0x0) read(r5, &(0x7f0000000000)=""/250, 0x128b9372) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0xff, 0xfb, 0x80, 0x0, 0x0, 0x4, 0xdc5a5180dfb2a11f, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6e, 0x7, @perf_config_ext={0x7, 0x4}, 0x20620, 0x9cc7, 0x9, 0x6, 0x3, 0x1, 0x4}, r8, 0xb, 0xffffffffffffffff, 0x4) fcntl$setstatus(r3, 0x4, 0x6100) getxattr(0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r9) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) 04:45:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:15 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r2, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r1}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 173.984343][ T9031] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 174.010517][ T9031] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:16 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r2, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:16 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r3, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:16 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') syz_open_dev$vcsa(0x0, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {}], 0x2, 0x0, 0x0, 0x0) 04:45:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:16 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r3, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 174.399240][ T9056] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) [ 174.465591][ T9056] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. [ 174.494253][ T26] audit: type=1800 audit(1573274716.464:33): pid=9016 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.5" name="cpuacct.usage_user" dev="sda1" ino=16603 res=0 04:45:16 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) socket$inet(0x2, 0x6, 0x2) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) r1 = socket$inet6(0xa, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000003e40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f45874600000004b1d1000000000000add2ad015e0d00c42d000004f6ffffff00000020259eb8d19e00004000000000000000000000000800057eef0052040008000000007e9f00030000feec06be00770096ff0000008104d759ade57a9715d59ce0e0a835a4d6b9fe56447cb80474f9ed4f0600000026d0ea4dba20c687b44020e148cf81be4fca8a40d6d1de3e5b8ee8006559012adeda552401b4cbfb66352cffb6bb9624b482c6413caa253ff7889f33a2b233677c5e00"/201], 0xc9) recvmmsg(r0, &(0x7f00000085c0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/226, 0xe2}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.swap.current\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) write$cgroup_int(r2, &(0x7f0000000000), 0xffffff6a) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003e40), 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet(r0, &(0x7f00000012c0)="03", 0x1, 0x9, 0x0, 0x0) 04:45:16 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r3, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:16 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) 04:45:16 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:16 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:16 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r3, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040)=0x100000, 0x8001) [ 174.831693][ T9082] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 174.859519][ T9082] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:16 executing program 2: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() nanosleep(&(0x7f0000000000)={0x0, 0x1c9c380}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x36) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7, 0x146}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 04:45:17 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') syz_open_dev$vcsa(0x0, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {}], 0x2, 0x0, 0x0, 0x0) 04:45:17 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:17 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r3, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040)=0x100000, 0x8001) 04:45:17 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='events\x00\x00\x00\xc7\xaa\xff\x0f\xb0\xc7\x9b\x93\x91\xe4\xaedY\xd8\x00\x00\x00\x00\x00', 0xf0, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0x8}, 0x0) 04:45:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390100a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:17 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:17 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f0000425000/0x1000)=nil, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r3, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040)=0x100000, 0x8001) 04:45:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000240)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000240)={0xffff, 0x401}) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) socket$inet6(0xa, 0x0, 0x4) sync() vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x3, 0x12, 0x0, 0xff, 0x2, 0x1, 0x0, 0x6}) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000380)=""/190) 04:45:17 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) [ 175.610940][ T9132] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 175.630035][ T9132] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:17 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:17 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:18 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') syz_open_dev$vcsa(0x0, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r1}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 04:45:18 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:18 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') syz_open_dev$vcsa(0x0, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r3, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, &(0x7f0000000040)=0x100000, 0x8001) 04:45:18 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000100)=0x1c, 0x4) 04:45:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r3, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, &(0x7f0000000040)=0x100000, 0x8001) 04:45:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r1}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 04:45:18 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') syz_open_dev$vcsa(0x0, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:18 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r3, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, &(0x7f0000000040)=0x100000, 0x8001) 04:45:18 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') syz_open_dev$vcsa(0x0, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390100a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r1}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 04:45:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000100)=0x1c, 0x4) 04:45:18 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:18 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:18 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') syz_open_dev$vcsa(0x0, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:19 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:19 executing program 2: 04:45:19 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') syz_open_dev$vcsa(0x0, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:19 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:19 executing program 2: 04:45:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:19 executing program 2: 04:45:19 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') syz_open_dev$vcsa(0x0, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:19 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 177.308638][ T9252] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 177.332606][ T9252] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:19 executing program 2: 04:45:19 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfec8) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 04:45:19 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') syz_open_dev$vcsa(0x0, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:19 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:19 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') syz_open_dev$vcsa(0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:19 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:19 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x2080084121, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(r0, 0x40140921, &(0x7f0000001200)={0x0, 0x9, 0x0, 0x0}) r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) fallocate(r1, 0x11, 0x0, 0x8000) r2 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DEST(r2, 0x0, 0x40000) 04:45:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) [ 177.836156][ T9290] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 177.863524][ T9290] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:19 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 177.960811][ T9301] md: md0 has zero or unknown size, marking faulty! 04:45:20 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) [ 178.014227][ T9301] md: md_import_device returned -22 04:45:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:20 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 178.147595][ T9301] md: md0 has zero or unknown size, marking faulty! [ 178.187434][ T9301] md: md_import_device returned -22 04:45:20 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:20 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:20 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x2080084121, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKPG(r0, 0x40140921, &(0x7f0000001200)={0x0, 0x9, 0x0, 0x0}) r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) fallocate(r1, 0x11, 0x0, 0x8000) r2 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DEST(r2, 0x0, 0x40000) [ 178.300669][ T9337] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:20 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:20 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 178.399723][ T9337] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. [ 178.551721][ T9353] md: md0 has zero or unknown size, marking faulty! [ 178.562991][ T9353] md: md_import_device returned -22 04:45:20 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:20 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:20 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:20 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r3, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:20 executing program 2: 04:45:20 executing program 2: [ 178.942025][ T9385] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:20 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r3, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:21 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) [ 178.982984][ T9385] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:21 executing program 2: 04:45:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:21 executing program 2: 04:45:21 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r3, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:21 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{}, {r1}], 0x2, 0x0, 0x0, 0x0) 04:45:21 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:21 executing program 2: 04:45:21 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{}, {r1}], 0x2, 0x0, 0x0, 0x0) 04:45:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) [ 179.417660][ T9413] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 179.435502][ T9413] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:21 executing program 2: 04:45:21 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:21 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{}, {r1}], 0x2, 0x0, 0x0, 0x0) 04:45:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:21 executing program 2: 04:45:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:21 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390100a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:21 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) close(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r0}, {r1}], 0x2, 0x0, 0x0, 0x0) [ 179.893930][ T9443] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:21 executing program 2: [ 179.948149][ T9443] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:22 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:22 executing program 2: 04:45:22 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) close(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r0}, {r1}], 0x2, 0x0, 0x0, 0x0) 04:45:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:22 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:22 executing program 2: 04:45:22 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) close(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r0}, {r1}], 0x2, 0x0, 0x0, 0x0) 04:45:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:22 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:22 executing program 2: 04:45:22 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) [ 180.485023][ T9484] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:22 executing program 2: [ 180.534865][ T9484] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390100a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:22 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:22 executing program 2: 04:45:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:22 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32, @ANYBLOB="00000000ffdfffff0000000008000100686866000c0002000872c2"], 0x3}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:22 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:22 executing program 2: 04:45:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:22 executing program 2: 04:45:22 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) [ 180.957268][ T9521] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:23 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) [ 181.055461][ T9521] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:23 executing program 2: 04:45:23 executing program 1: mkdir(0x0, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:23 executing program 2: 04:45:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:23 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:23 executing program 1: mkdir(0x0, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:23 executing program 2: [ 181.443301][ T9558] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:23 executing program 1: mkdir(0x0, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) [ 181.486491][ T9558] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:23 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390100a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:23 executing program 2: 04:45:23 executing program 0: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:23 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:23 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:23 executing program 2: 04:45:23 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 181.831365][ T9587] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 181.864796][ T9587] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:23 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:23 executing program 3: 04:45:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:24 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:24 executing program 2: 04:45:24 executing program 3: 04:45:24 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:24 executing program 0: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:24 executing program 2: 04:45:24 executing program 3: 04:45:24 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:24 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:24 executing program 2: 04:45:24 executing program 3: 04:45:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:24 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 182.380739][ T9626] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:24 executing program 3: [ 182.452373][ T9626] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:24 executing program 2: 04:45:24 executing program 0: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:24 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:24 executing program 4: socket$inet6(0xa, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, &(0x7f0000000040)=0x100000, 0x8001) 04:45:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:24 executing program 3: 04:45:24 executing program 2: 04:45:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390100a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:24 executing program 3: 04:45:24 executing program 2: [ 182.839428][ T9657] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 182.863005][ T9657] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:24 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:24 executing program 3: 04:45:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390100a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:25 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:25 executing program 4: socket$inet6(0xa, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, &(0x7f0000000040)=0x100000, 0x8001) 04:45:25 executing program 3: 04:45:25 executing program 2: 04:45:25 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:25 executing program 3: 04:45:25 executing program 2: 04:45:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 183.219931][ T9688] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:25 executing program 4: socket$inet6(0xa, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, &(0x7f0000000040)=0x100000, 0x8001) 04:45:25 executing program 3: 04:45:25 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:25 executing program 2: [ 183.312350][ T9688] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:25 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:25 executing program 3: 04:45:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:25 executing program 2: 04:45:25 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:25 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040)=0x100000, 0x8001) 04:45:25 executing program 2: 04:45:25 executing program 3: 04:45:25 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:25 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040)=0x100000, 0x8001) 04:45:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 183.672325][ T9723] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:25 executing program 2: [ 183.780200][ T9723] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:26 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:26 executing program 3: 04:45:26 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:26 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040)=0x100000, 0x8001) 04:45:26 executing program 2: 04:45:26 executing program 3: 04:45:26 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff}) writev(0xffffffffffffffff, 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x422000a7b, 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000440)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getegid() request_key(0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80080, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, 0x0, 0x20000084) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fadvise64(r1, 0x4, 0x3, 0x1) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) 04:45:26 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8001) [ 184.119054][ T9756] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 184.133791][ T9756] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:26 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:26 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0, 0xfffffffffffffcdd}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x4) 04:45:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:26 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:26 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8001) 04:45:26 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0, 0xfffffffffffffcdd}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x2) 04:45:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 04:45:26 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x8001) 04:45:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x35, &(0x7f0000000000)={'filter\x00', 0x2, [{}, {}]}, 0x48) 04:45:26 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) [ 184.530706][ T9795] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 184.575846][ T9795] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:26 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 04:45:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:26 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040), 0x8001) 04:45:26 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, 0x0, &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) [ 184.784037][ T9817] netlink: 'syz-executor.2': attribute type 9 has an invalid length. [ 184.801188][ T9817] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.2'. [ 184.880453][ T9827] netlink: 'syz-executor.3': attribute type 9 has an invalid length. 04:45:26 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040), 0x8001) 04:45:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 04:45:26 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, 0x0, &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 184.921900][ T9827] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.3'. [ 184.977548][ T9834] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:27 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, 0x0, &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) [ 185.050824][ T9834] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1c, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 04:45:27 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1c, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 185.229604][ T9846] netlink: 'syz-executor.2': attribute type 9 has an invalid length. [ 185.238737][ T9846] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.2'. 04:45:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1c, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:27 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040), 0x8001) 04:45:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 04:45:27 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2a, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:27 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2a, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:27 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x900) r1 = syz_open_dev$cec(&(0x7f00000003c0)='/dev/cec#\x00', 0x3, 0x2) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x419}}, 0x0, 0x86d, 0x0, "b11417f0206e36c7bf49104a84f9dc11b91ed73dc8bb43273f95ab2365e422ece3ebda60cd0abd80bb8887b2f90c9c520f902ebfe337f75eb62fa354d9bb7b83d1c0a860aaa04f8ed18fbb2863261f10"}, 0xd8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000001c0), 0xa}, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000240)='./file0\x00') r2 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./file0\x00') remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x1000002, 0x3ff, 0x4000) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x23080, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="c9bb666fcb493efbc7112c109c6691fac46875662911847d63"], &(0x7f0000000300)='.', 0x0, 0x1110, 0x0) 04:45:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:27 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 04:45:27 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x0) 04:45:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2a, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:27 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x0) 04:45:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x31, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 04:45:27 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x0) 04:45:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x31, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x31, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:28 executing program 3 (fault-call:4 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 186.205488][ T9944] FAULT_INJECTION: forcing a failure. [ 186.205488][ T9944] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 186.263483][ T9944] CPU: 1 PID: 9944 Comm: syz-executor.3 Not tainted 5.4.0-rc6+ #0 [ 186.271334][ T9944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.281389][ T9944] Call Trace: [ 186.289983][ T9944] dump_stack+0x1fb/0x318 [ 186.294324][ T9944] should_fail+0x555/0x770 [ 186.298772][ T9944] should_fail_alloc_page+0x55/0x60 [ 186.303976][ T9944] prepare_alloc_pages+0x283/0x460 [ 186.309096][ T9944] __alloc_pages_nodemask+0xb2/0x5d0 [ 186.314397][ T9944] alloc_pages_vma+0x4f7/0xd50 [ 186.319173][ T9944] handle_mm_fault+0x30af/0x5ff0 [ 186.324133][ T9944] do_user_addr_fault+0x589/0xaf0 [ 186.329177][ T9944] __do_page_fault+0xd3/0x1f0 [ 186.333866][ T9944] do_page_fault+0x99/0xb0 [ 186.338281][ T9944] page_fault+0x39/0x40 [ 186.342429][ T9944] RIP: 0033:0x408d9d [ 186.346321][ T9944] Code: 0f 1f 44 00 00 c6 44 24 0e 06 48 c7 04 24 10 00 00 00 e9 56 ff ff ff e8 91 51 05 00 90 41 55 41 54 55 53 48 81 ec d8 1b 00 00 <48> 89 bc 24 08 01 00 00 48 89 b4 24 00 01 00 00 48 89 94 24 f8 00 [ 186.365917][ T9944] RSP: 002b:00007f1b42ee3070 EFLAGS: 00010202 [ 186.371972][ T9944] RAX: 0000000000408d90 RBX: 00007f1b42ee4c90 RCX: 0000000000000000 [ 186.379930][ T9944] RDX: 0000000020000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 186.387892][ T9944] RBP: 000000000075bf20 R08: fffffffffffffde5 R09: 0000000000000000 [ 186.395942][ T9944] R10: 0000000000000064 R11: 0000000000000000 R12: 00007f1b42ee56d4 [ 186.403899][ T9944] R13: 00000000004c99f8 R14: 00000000004e16e0 R15: 0000000000000006 [ 186.413192][ T9944] syz-executor.3 invoked oom-killer: gfp_mask=0x0(), order=0, oom_score_adj=1000 [ 186.422494][ T9944] CPU: 1 PID: 9944 Comm: syz-executor.3 Not tainted 5.4.0-rc6+ #0 [ 186.430287][ T9944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.440329][ T9944] Call Trace: [ 186.443614][ T9944] dump_stack+0x1fb/0x318 [ 186.447932][ T9944] dump_header+0xd8/0x960 [ 186.452244][ T9944] oom_kill_process+0xcd/0x350 [ 186.456995][ T9944] out_of_memory+0x5fa/0x8b0 [ 186.461585][ T9944] pagefault_out_of_memory+0x69/0xa0 [ 186.466860][ T9944] mm_fault_error+0x186/0x2c0 [ 186.471528][ T9944] do_user_addr_fault+0x95e/0xaf0 [ 186.476574][ T9944] __do_page_fault+0xd3/0x1f0 [ 186.481294][ T9944] do_page_fault+0x99/0xb0 [ 186.485709][ T9944] page_fault+0x39/0x40 [ 186.489852][ T9944] RIP: 0033:0x408d9d [ 186.493744][ T9944] Code: 0f 1f 44 00 00 c6 44 24 0e 06 48 c7 04 24 10 00 00 00 e9 56 ff ff ff e8 91 51 05 00 90 41 55 41 54 55 53 48 81 ec d8 1b 00 00 <48> 89 bc 24 08 01 00 00 48 89 b4 24 00 01 00 00 48 89 94 24 f8 00 04:45:28 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 04:45:28 executing program 4 (fault-call:7 fault-nth:0): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000a30305000a000200030ada1b40d805000500c50083b8", 0xa4}], 0x1}, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0xe, 0x28b16df541be42cf) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x8, 0x2, 0x8, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_EXTEND(r5, 0x40086607, &(0x7f00000002c0)=0x9) sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f0000000140)={0x0, 0xfffffffffffffeb9, &(0x7f0000000000)={&(0x7f0000000200)={0x20, r3, 0x439, 0x0, 0x0, {0xa}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x20}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xa24006aa}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0x390, r3, 0x1, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x0, 0x8, 0x10008}, @IPVS_SVC_ATTR_PORT={0x0, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PORT={0x0, 0x4, 0x3f}, @IPVS_SVC_ATTR_TIMEOUT={0x0, 0x8, 0xaf}, @IPVS_SVC_ATTR_PROTOCOL={0x0, 0x2, 0x3a}, @IPVS_SVC_ATTR_FWMARK={0x0, 0x5, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x0, 0x2, 0x6c}]}, @IPVS_CMD_ATTR_DEST={0x3ec}, @IPVS_CMD_ATTR_DAEMON={0x0, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x0, 0x7, 0x4e24}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x20}, 0x600d0) [ 186.513345][ T9944] RSP: 002b:00007f1b42ee3070 EFLAGS: 00010202 [ 186.519398][ T9944] RAX: 0000000000408d90 RBX: 00007f1b42ee4c90 RCX: 0000000000000000 [ 186.527354][ T9944] RDX: 0000000020000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 186.535321][ T9944] RBP: 000000000075bf20 R08: fffffffffffffde5 R09: 0000000000000000 [ 186.543289][ T9944] R10: 0000000000000064 R11: 0000000000000000 R12: 00007f1b42ee56d4 [ 186.551255][ T9944] R13: 00000000004c99f8 R14: 00000000004e16e0 R15: 0000000000000006 [ 186.575352][ T9944] Mem-Info: [ 186.578545][ T9944] active_anon:111690 inactive_anon:220 isolated_anon:0 [ 186.578545][ T9944] active_file:7730 inactive_file:37250 isolated_file:0 [ 186.578545][ T9944] unevictable:0 dirty:162 writeback:0 unstable:0 [ 186.578545][ T9944] slab_reclaimable:12168 slab_unreclaimable:97307 [ 186.578545][ T9944] mapped:59002 shmem:270 pagetables:1045 bounce:0 [ 186.578545][ T9944] free:1271118 free_pcp:487 free_cma:0 04:45:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 186.624269][ T9953] FAULT_INJECTION: forcing a failure. [ 186.624269][ T9953] name failslab, interval 1, probability 0, space 0, times 1 [ 186.662120][ T9953] CPU: 1 PID: 9953 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 186.669962][ T9953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.680018][ T9953] Call Trace: [ 186.680035][ T9953] dump_stack+0x1fb/0x318 [ 186.680052][ T9953] should_fail+0x555/0x770 [ 186.680069][ T9953] __should_failslab+0x11a/0x160 [ 186.680084][ T9953] should_failslab+0x9/0x20 [ 186.701484][ T9953] kmem_cache_alloc_trace+0x5d/0x2f0 [ 186.706774][ T9953] ? alloc_pipe_info+0xae/0x3f0 [ 186.711625][ T9953] alloc_pipe_info+0xae/0x3f0 [ 186.716304][ T9953] splice_direct_to_actor+0x910/0xac0 [ 186.721674][ T9953] ? do_splice_direct+0x330/0x330 [ 186.726700][ T9953] ? rcu_lock_release+0xd/0x30 [ 186.731462][ T9953] ? security_file_permission+0x148/0x350 [ 186.737185][ T9953] ? rw_verify_area+0x1c2/0x360 [ 186.742044][ T9953] do_splice_direct+0x200/0x330 [ 186.746897][ T9953] ? security_file_permission+0xd0/0x350 [ 186.752519][ T9953] do_sendfile+0x7e4/0xfd0 [ 186.756950][ T9953] __x64_sys_sendfile64+0xfc/0x1b0 [ 186.762075][ T9953] do_syscall_64+0xf7/0x1c0 [ 186.766582][ T9953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.772476][ T9953] RIP: 0033:0x45a219 [ 186.776361][ T9953] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.779824][ T9944] Node 0 active_anon:444736kB inactive_anon:880kB active_file:30776kB inactive_file:149000kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:236008kB dirty:644kB writeback:0kB shmem:1080kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 47104kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 04:45:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x37, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 186.795959][ T9953] RSP: 002b:00007f512f662c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 186.795970][ T9953] RAX: ffffffffffffffda RBX: 00007f512f662c90 RCX: 000000000045a219 [ 186.795976][ T9953] RDX: 0000000020000040 RSI: 0000000000000004 RDI: 0000000000000003 [ 186.795982][ T9953] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 186.795987][ T9953] R10: 0000000000008001 R11: 0000000000000246 R12: 00007f512f6636d4 [ 186.795992][ T9953] R13: 00000000004c7f94 R14: 00000000004de3b0 R15: 0000000000000008 [ 186.860217][ T9944] Node 1 active_anon:0kB inactive_anon:0kB active_file:144kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 04:45:28 executing program 4 (fault-call:7 fault-nth:1): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x7f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fy=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) open$dir(&(0x7f0000000180)='./file0/file0\x00', 0xa00, 0x2) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0x0, 0xffff45ea, 0x8}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$unix(r2, 0x0, 0x0, 0x4000, &(0x7f0000000440)=@abs={0x1, 0x0, 0x4e23}, 0x6e) rt_sigprocmask(0x2, &(0x7f0000000080)={0x3}, &(0x7f00000000c0), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x80000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r9 = gettid() sendmsg$nl_route(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="84000000108000"/20, @ANYRES32=r8, @ANYBLOB="000000000000000008001300", @ANYRES32=r9, @ANYBLOB="5c0019000800010000000000080006000000000010000200657468315c707070305d00000800060000000000050001000000000014000500441fa27574fc0e85df6790088de8fc0a08000100000000000c0002006c6f282b2b7b0000"], 0x84}}, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r10, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001880)=ANY=[@ANYBLOB="38010000100013070000000000000000e000000200000000000000000000000000000000000000000000000000000000000800000000000000000084090121012eda31c255745bf75539ab420da86f725705bc2826e47f8fa74e289d8914d945275ca9d71ab026c6d49fe8977b6495e9b480a4f7c34ad5d3956374f4c6c2b50a03ac525eb778b59a1b2adc0000bed51caaa9b88c91c1e5d682f0fb18adecad37575108755cde834757694cf1e1384d55c7ca3dee410c00247f37fc24621d0470e29fe0e5ccc4dcf13413f638a8a86684dbbdbbc4405e85c39adac5e792bff5eb37fe3f17d97e505cf24e2c3a25721b2b506e365bf6548b60", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f0000000000000000000ffffffffffff0000000032000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002cbd7000000000000a000400000000000000000048000200656362286369706865725f6e756c6c2900"/240], 0x138}}, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f00000016c0)={0x0, 0x0}, &(0x7f0000001700)=0xc) getresgid(&(0x7f0000001740), &(0x7f0000001780), &(0x7f00000017c0)=0x0) sendmmsg$unix(r4, &(0x7f0000001840)=[{&(0x7f0000000340)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000001640)=[{&(0x7f00000004c0)="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", 0x1000}, {&(0x7f0000000400)="c5e8be01494da65866932b71c3765ea485ddeb6a2cfd70e48f8f3921e140a2", 0x1f}, {&(0x7f00000014c0)="a3f05e831e1419f79a089ecabf9ff40a1669ee16f347bac248e6e17280ec79cd146bdadbdcb971d0d3c9dd8c34a5fb", 0x2f}, {&(0x7f0000001500)="47b40e73e1aef2813780a5588a38a3528d253a9eb18c5cdc0560c854c45d0eb00055f6feb0bb275bd4a0fb73a4cd57a48b03ffa9cca8fea40c95cd9a57b58a8e58e51a6fcf4cbab4a4578bb6d33150a5fab5c18f889a252ad26d5277508e3247831975eed4691109c11f7885ff22686c7195a81e67d749db37e3a8ed13201854772cd066f9aedd65f73ee163a975734f0d2eff722b71dac48e1ecc24f0cd6329d257a638de84af6b36243ebef02a", 0xae}, {&(0x7f00000015c0)="a59473c80f742493c688f7472aaf248c4c5cab1794dc626fd42755878ab431f31caff60c638a02df6af56f253fc37967c0678bf4335e213a9acc028ac59170c79f5db2299708ba78f0", 0x49}], 0x5, &(0x7f0000001a80)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32=r3, @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r9, @ANYRES32=r11, @ANYRES32=r12, @ANYBLOB="0095b28bd3435d000000fb421b6d94afaf643e91e90f37184fdbd0562693e26648399a00d5c4ba0338bb33a57a29ab01a5ed77e03b989370acfbc5aa346223f177d06fab0eaa3c22c9a0afc187d57cbfcc6bebfae918bfefa05ad03468236065b78180d5bd38b340bdb33c42bec582943ca654c25fb584db0ed388dcf2"], 0x40, 0x1}], 0x1, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKRESETZONE(r5, 0x40101283, &(0x7f00000002c0)={0xccae, 0x100000001}) r13 = socket(0x11, 0x800000003, 0x0) bind(r13, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r13, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r14, @ANYBLOB="00000000ffffffff0000000008000100686866000c000200080005"], 0x3}}, 0x0) connect$can_j1939(r3, &(0x7f00000001c0)={0x1d, r14, 0x0, {0x0, 0x1}, 0xfe}, 0x18) ioctl$RTC_ALM_READ(r3, 0x80247008, &(0x7f0000000140)) 04:45:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x37, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 186.919889][ T9944] Node 0 DMA free:15904kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 186.981653][ T9973] fuse: Unknown parameter 'fy' [ 187.010900][ T9944] lowmem_reserve[]: 0 2567 2568 2568 [ 187.042244][ T9981] FAULT_INJECTION: forcing a failure. [ 187.042244][ T9981] name failslab, interval 1, probability 0, space 0, times 0 [ 187.054573][ T9944] Node 0 DMA32 free:1285688kB min:36352kB low:45440kB high:54528kB active_anon:451520kB inactive_anon:876kB active_file:29468kB inactive_file:148924kB unevictable:0kB writepending:636kB present:3129332kB managed:2632152kB mlocked:0kB kernel_stack:7872kB pagetables:4476kB bounce:0kB free_pcp:2048kB local_pcp:1348kB free_cma:0kB [ 187.075395][ T9981] CPU: 0 PID: 9981 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 187.093476][ T9981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.093482][ T9981] Call Trace: [ 187.093496][ T9981] dump_stack+0x1fb/0x318 [ 187.093510][ T9981] should_fail+0x555/0x770 [ 187.093526][ T9981] __should_failslab+0x11a/0x160 [ 187.115553][ T9981] ? kcalloc+0x36/0x60 [ 187.115566][ T9981] should_failslab+0x9/0x20 [ 187.115578][ T9981] __kmalloc+0x7a/0x340 [ 187.115592][ T9981] kcalloc+0x36/0x60 [ 187.115605][ T9981] alloc_pipe_info+0x1ce/0x3f0 [ 187.121034][ T9944] lowmem_reserve[]: 0 0 1 1 [ 187.124578][ T9981] splice_direct_to_actor+0x910/0xac0 [ 187.124587][ T9981] ? do_splice_direct+0x330/0x330 [ 187.124601][ T9981] ? rcu_lock_release+0xd/0x30 [ 187.124613][ T9981] ? security_file_permission+0x148/0x350 [ 187.124626][ T9981] ? rw_verify_area+0x1c2/0x360 [ 187.124638][ T9981] do_splice_direct+0x200/0x330 [ 187.124652][ T9981] ? security_file_permission+0xd0/0x350 [ 187.124665][ T9981] do_sendfile+0x7e4/0xfd0 [ 187.129451][ T9944] Node 0 Normal free:4kB min:16kB low:20kB high:24kB active_anon:36kB inactive_anon:4kB active_file:1308kB inactive_file:76kB unevictable:0kB writepending:8kB present:786432kB managed:1428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 187.133293][ T9981] __x64_sys_sendfile64+0xfc/0x1b0 [ 187.133310][ T9981] do_syscall_64+0xf7/0x1c0 [ 187.133329][ T9981] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.133338][ T9981] RIP: 0033:0x45a219 [ 187.133348][ T9981] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.133353][ T9981] RSP: 002b:00007f512f641c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 187.137439][ T9944] lowmem_reserve[]: 0 0 0 0 [ 187.141965][ T9981] RAX: ffffffffffffffda RBX: 00007f512f641c90 RCX: 000000000045a219 [ 187.141972][ T9981] RDX: 0000000020000040 RSI: 0000000000000004 RDI: 0000000000000003 [ 187.141978][ T9981] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 187.141984][ T9981] R10: 0000000000008001 R11: 0000000000000246 R12: 00007f512f6426d4 [ 187.141990][ T9981] R13: 00000000004c7f94 R14: 00000000004de3b0 R15: 0000000000000008 [ 187.214760][ T9944] Node 1 Normal free:3778524kB min:53516kB low:66892kB high:80268kB active_anon:0kB inactive_anon:0kB active_file:144kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870244kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:248kB local_pcp:0kB free_cma:0kB [ 187.230064][ T9944] lowmem_reserve[]: 0 0 0 0 [ 187.246089][ T9982] fuse: Unknown parameter 'fy' [ 187.267813][ T9944] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 187.337214][ T9944] Node 0 DMA32: 7595*4kB (UME) 4771*8kB (UME) 2130*16kB (UME) 916*32kB (UME) 395*64kB (UME) 68*128kB (UME) 18*256kB (UM) 19*512kB (UME) 6*1024kB (U) 3*2048kB (UM) 268*4096kB (UM) = 1290276kB [ 187.344924][ T9944] Node 0 Normal: 1*4kB (M) 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4kB [ 187.390463][ T9944] Node 1 Normal: 1*4kB (E) 61*8kB (UME) 161*16kB (UME) 75*32kB (UE) 22*64kB (U) 20*128kB (UME) 9*256kB (UME) 3*512kB (UE) 3*1024kB (UM) 1*2048kB (M) 918*4096kB (M) = 3778524kB [ 187.408095][ T9944] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 187.423026][ T9944] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 187.432454][ T9944] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 187.452499][ T9944] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 187.461891][ T9944] 45249 total pagecache pages [ 187.467317][ T9944] 0 pages in swap cache [ 187.471489][ T9944] Swap cache stats: add 0, delete 0, find 0/0 [ 187.478704][ T9944] Free swap = 0kB [ 187.482427][ T9944] Total swap = 0kB [ 187.486283][ T9944] 1965979 pages RAM [ 187.490087][ T9944] 0 pages HighMem/MovableOnly [ 187.494867][ T9944] 336047 pages reserved [ 187.499016][ T9944] 0 pages cma reserved [ 187.503132][ T9944] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,global_oom,task_memcg=/syz2,task=syz-executor.2,pid=8850,uid=0 [ 187.518865][ T9944] Out of memory: Killed process 8850 (syz-executor.2) total-vm:72584kB, anon-rss:2200kB, file-rss:35784kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 04:45:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x0, 0x0, 0x267) 04:45:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x37, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182bab"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:29 executing program 4 (fault-call:7 fault-nth:2): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$int_in(r0, 0x73, &(0x7f0000000140)=0x1) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x4a242, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x400, 0xfffffffc, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0x359, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_AD_ACTOR_SYS_PRIO={0x8, 0x18, 0x1}, @IFLA_BOND_MODE={0x8, 0x1, 0x4}]}}}]}, 0x44}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCSCTTY(r1, 0x540e, 0x0) 04:45:29 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) [ 187.537420][ T1071] oom_reaper: reaped process 8850 (syz-executor.2), now anon-rss:0kB, file-rss:34824kB, shmem-rss:0kB [ 187.581125][ T9994] FAULT_INJECTION: forcing a failure. [ 187.581125][ T9994] name failslab, interval 1, probability 0, space 0, times 0 [ 187.599982][ T9996] validate_nla: 7 callbacks suppressed [ 187.599987][ T9996] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 187.630224][ T9994] CPU: 1 PID: 9994 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 187.638066][ T9994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.648121][ T9994] Call Trace: [ 187.650521][ T9996] __nla_validate_parse: 9 callbacks suppressed [ 187.650557][ T9996] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. [ 187.651404][ T9994] dump_stack+0x1fb/0x318 [ 187.651422][ T9994] should_fail+0x555/0x770 [ 187.651441][ T9994] __should_failslab+0x11a/0x160 [ 187.651456][ T9994] should_failslab+0x9/0x20 [ 187.651467][ T9994] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 187.651479][ T9994] ? __kmalloc_node+0x3c/0x60 [ 187.675711][ T9994] ? __x64_sys_sendfile64+0xfc/0x1b0 [ 187.675723][ T9994] ? do_syscall_64+0xf7/0x1c0 [ 187.675735][ T9994] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.675750][ T9994] __kmalloc_node+0x3c/0x60 [ 187.675762][ T9994] kvmalloc_node+0xcc/0x130 [ 187.675774][ T9994] iov_iter_get_pages_alloc+0x87d/0xc50 [ 187.675789][ T9994] default_file_splice_read+0x10e/0x8d0 04:45:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x38, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 187.675805][ T9994] ? fsnotify+0x1318/0x13d0 [ 187.675826][ T9994] ? security_file_permission+0x23c/0x350 [ 187.675841][ T9994] ? rw_verify_area+0x1c2/0x360 [ 187.675850][ T9994] ? __ia32_sys_tee+0xb0/0xb0 [ 187.675860][ T9994] splice_direct_to_actor+0x39c/0xac0 [ 187.675867][ T9994] ? do_splice_direct+0x330/0x330 [ 187.675888][ T9994] do_splice_direct+0x200/0x330 [ 187.690996][ T9994] ? security_file_permission+0xd0/0x350 [ 187.691011][ T9994] do_sendfile+0x7e4/0xfd0 [ 187.691038][ T9994] __x64_sys_sendfile64+0xfc/0x1b0 04:45:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x38, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 187.691053][ T9994] do_syscall_64+0xf7/0x1c0 [ 187.786184][ T9994] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.792072][ T9994] RIP: 0033:0x45a219 [ 187.795960][ T9994] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.815558][ T9994] RSP: 002b:00007f512f662c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 187.815568][ T9994] RAX: ffffffffffffffda RBX: 00007f512f662c90 RCX: 000000000045a219 04:45:29 executing program 4 (fault-call:7 fault-nth:3): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 187.815574][ T9994] RDX: 0000000020000040 RSI: 0000000000000004 RDI: 0000000000000003 [ 187.815579][ T9994] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 187.815585][ T9994] R10: 0000000000008001 R11: 0000000000000246 R12: 00007f512f6636d4 [ 187.815589][ T9994] R13: 00000000004c7f94 R14: 00000000004de3b0 R15: 0000000000000008 04:45:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x38, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x8, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="00004200008f00008ad810597105bc254d59ce2604bf2c653bcd462f585f3186fc2ea22c683cbdad7d54bda6c7ea1e934065e64aa2eec2c71a3614ed847538c3ea3a6966f845683d699c934f0dc40cdf716542a558a069e0c8c9b331d2b4f7f0201a4bdca5014bf47c63fdfa26a4e4e5d9"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='//z0\xff', 0x1c0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000200)={'ip6erspan0\x00', {0x2, 0x4e21, @rand_addr=0x5}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000800)={r3, 0x0, 0xde, 0x8f, &(0x7f00000004c0)="7ae776e1c5bd8985279a03db010395c99e96cbe95e8e00ca76e7beef1ca67d30c077ec7035184a408134b0e8c06ee7ffd116104be89a682d1235b8d9d04d0155deadbf8be011b01cfb04ab5f1a4e938802929902f0ff26cc4f6a3c9bc547d86b5248f7896c461cfa58e40d888d4341afe38486da56cab4ec67e8534ebc19ba42fa1ddd6582f0a6cda746444d0e203a31da4a8676b62526ae51649125170da0b3f93180f70ff5ccbbd236b9c63910a1cf763f3dc94dd4f4c213c734c3e7c24349f82a133236d4d5d83e1fb81023d9f170c7e143a11b0cc4270bd649c74788", &(0x7f00000005c0)=""/143, 0x81, 0x0, 0x7f, 0xec, &(0x7f0000000680)="9615e43c7f32e2551999a937936f6ac01fd742ee7f50a01eae00353d47a50500ad4ce2f2ab5d030ecffbdea845140807acc6c5ac7582395c930b9a1882ae5442e0775f8b77c6d9195f3054d6ae6778d405cd82d774effead15278f84e28e20b90b6b91d8dbfe2b6a91117f55611d866d355d21abedcc76ffc5aa2bb31dfd32", &(0x7f0000000700)="d99bb96a21f3af05c85c3ed3f6aac0d5d41d4a29bc1e5e5dabbdb20f31da7c76359fa00af8dc1fe7138764eca8b92628060ba4062285d7c4d7c64b4f4d752b45212164896d9e073c2af6984ce9fab91ee4bd65e4fc987619d6271c5885d9d2a9d12bcc63e9f34fbf4e14ce507a5668983acf1251786d96a6c7ea45b7c5cc77f0bffda72f7111cf82b30b2a2165c587f1b127bfc366b9c51f73ebf0bf23ffbfac31dae7e2750323341b1a97fe24231b61930246a8441ddead827099703068d15219355301a77cac7f9f12a5c2e8dd6045f9cd40b2bc0a3cfe6fb344f93ccd7415e3355fb5c3c1247d56b35823"}, 0x40) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f00000003c0)=@ccm_128={{0x483}, "00db97fe8dd04d16", "87114514ea6e3ae03c464b02ebafd39f", "6f28ed24", "9768c8d23533eb54"}, 0x28) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$VIDIOC_ENCODER_CMD(0xffffffffffffffff, 0xc028564d, &(0x7f0000000380)={0x2, 0x1, [0x0, 0x2e76edd5, 0xffffff81, 0x0, 0x7, 0x8000, 0xffffff9d, 0xfffff801]}) ioctl$FS_IOC_SETVERSION(r4, 0x40087602, &(0x7f0000000400)=0x1) ioctl$SNDRV_TIMER_IOCTL_GINFO(r5, 0xc0f85403, &(0x7f0000000100)={{0x1, 0x3, 0x5, 0x3, 0x3}, 0x0, 0xfffffffd, 'id0\x00', 'timer0\x00', 0x0, 0x6, 0x3e0000000, 0x3, 0x10000}) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) clock_nanosleep(0x4, 0x1, &(0x7f0000000480)={r6, r7+10000000}, 0x0) [ 187.956387][T10015] FAULT_INJECTION: forcing a failure. [ 187.956387][T10015] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 188.020982][T10015] CPU: 0 PID: 10015 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 188.028911][T10015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.038959][T10015] Call Trace: [ 188.042235][T10015] dump_stack+0x1fb/0x318 [ 188.046544][T10015] should_fail+0x555/0x770 [ 188.050942][T10015] should_fail_alloc_page+0x55/0x60 [ 188.056148][T10015] prepare_alloc_pages+0x283/0x460 [ 188.061244][T10015] __alloc_pages_nodemask+0xb2/0x5d0 [ 188.066536][T10015] alloc_pages_current+0x2db/0x500 [ 188.071638][T10015] push_pipe+0x3b1/0x750 [ 188.075875][T10015] __pipe_get_pages+0x8b/0x390 [ 188.080717][T10015] ? __kmalloc_node+0x4d/0x60 [ 188.085374][T10015] iov_iter_get_pages_alloc+0x89b/0xc50 [ 188.090897][T10015] default_file_splice_read+0x10e/0x8d0 [ 188.096423][T10015] ? fsnotify+0x1318/0x13d0 [ 188.100910][T10015] ? security_file_permission+0x23c/0x350 [ 188.106608][T10015] ? rw_verify_area+0x1c2/0x360 [ 188.111452][T10015] ? __ia32_sys_tee+0xb0/0xb0 [ 188.116105][T10015] splice_direct_to_actor+0x39c/0xac0 [ 188.121468][T10015] ? do_splice_direct+0x330/0x330 [ 188.126477][T10015] do_splice_direct+0x200/0x330 [ 188.131309][T10015] ? security_file_permission+0xd0/0x350 [ 188.136916][T10015] do_sendfile+0x7e4/0xfd0 [ 188.141317][T10015] __x64_sys_sendfile64+0xfc/0x1b0 [ 188.146410][T10015] do_syscall_64+0xf7/0x1c0 [ 188.150890][T10015] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.156758][T10015] RIP: 0033:0x45a219 [ 188.160631][T10015] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 188.180224][T10015] RSP: 002b:00007f512f641c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 188.188621][T10015] RAX: ffffffffffffffda RBX: 00007f512f641c90 RCX: 000000000045a219 [ 188.196570][T10015] RDX: 0000000020000040 RSI: 0000000000000004 RDI: 0000000000000003 [ 188.204530][T10015] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 188.212477][T10015] R10: 0000000000008001 R11: 0000000000000246 R12: 00007f512f6426d4 04:45:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x38, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 188.220448][T10015] R13: 00000000004c7f94 R14: 00000000004de3b0 R15: 0000000000000008 04:45:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x2, 0x0, 0x267) 04:45:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:30 executing program 4 (fault-call:7 fault-nth:4): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x38, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:30 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}], 0x1, 0x0, 0x0, 0x0) [ 188.377687][T10033] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 188.394040][T10030] FAULT_INJECTION: forcing a failure. [ 188.394040][T10030] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:45:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="e75657efa99500007b0a00fff00000009580e82338000000000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x6, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$TIOCSISO7816(r1, 0xc0285443, &(0x7f0000001380)={0x0, 0x677, 0x0, 0x7fff, 0x7}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_KICK(r4, 0x4008af20, &(0x7f0000001340)={0x2, r1}) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001180)=@newsa={0x1b8, 0x10, 0x713, 0x0, 0x0, {{@in6=@rand_addr="13ef6d2eda776cca42e99365e9b293e6", @in, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x20}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0xff}, @in=@dev={0xac, 0x14, 0x14, 0x24}, {0x0, 0x0, 0x6000000000}, {0x0, 0xffffffffffffffff}, {}, 0x70bd25, 0x0, 0xa, 0xd104, 0x4}, [@algo_crypt={0xc8, 0x2, {{'ecb(cipher_null)\x00'}, 0x3f8, "1a8fb73c17ff4d7012472b322e9f300ce54924d691e54768f1f1fcfc51d72e26d4b33fc0efc4a21b30df7ab8ebe58f5704f371693d9b89ca2268f3ac01ad5be73ecf8db2fe6f27eb416a3b4e94566db2e1cb473f12a61450e4faa39a2b0e2f60faa34c12bcc78c5db6c468a64d66bbf2a8aaf8bc4f3b30bf11b85259e8f215"}}]}, 0x1b8}}, 0x0) fcntl$setpipe(r5, 0x407, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/rtc0\x00', 0x2281, 0x0) fremovexattr(r6, &(0x7f0000001400)=@known='trusted.overlay.origin\x00') write$UHID_INPUT(r1, &(0x7f0000000140)={0x8, "63b4c78907c4b15deb82f9ed1c35b3777cb97ce24cec5de1e18f0cf0bc02a5efe258813131859173a6a7f5c47e72c783554132914ac908e460f66234cad915b49be5d398875c89dfef2151f8bb29491fd3b3893c85b9419664fa04cf42a0cfa6a89475cc181684b44444b40965321bdd2195c1f394542f93b1536057fa17e78ea1e5c16b42038b79d3d1ab38510b96d07d86c30e2be56d5c77c04fe35f21a8ae10bd97a7fe017bb54a037f0aceacd9c79bb0d4c23898c26f520393a647de4d199c442396a0e2ca496083d04ac1c67a7ad0028b9ebb1a3f7fcd4c823b7968865ad7a17fb12d0199e621f3cce85795a73ce006f0caf1d297883a922673d9515d8a27081b33d04774db8ca37225ee42ebbbfba7f344dd2f159eb18c443026b41c3d9f4a8d03a14dbf009be58ad1775221fa03807202afbf3bb457948a08111cdf89d1771c4c78cce5d997032c281bd78c1a501ed92656aa33028132ac919d0bd8f80a35d840bb1bb8aa2ac8e56924a1ee6cb53bde4c75befff413324a436c9155c55b341c5c9b1739686b6ff206f0b0e376340c16969bb8718872217be7b097d1073f922b3335c464be781675b7b6194b6608288dbea1573fdb862062dc4c09d24c62699f18bf8f521883b00dfae8f6ebeb8c3c30dccf1e8d1b186637a0da1a0d7a2aaf349cb4cf1a3786ed51c6be4105bf1132a8d76383c03b573c97ab2a5f7b4e519a188a35d286957ae7b76f0d0476a53bb52ab1a29bf620086bafd6c973d3663b9fd28c0c13d900f6df1553e2e9328e217b356cb7ae53110fdd0b93f748e8eccb72cad147fc85b32fe5d57437b183f6d48f7e7646ba3e361e97ac15199e06efce17a8e0eb07081e847b20c9c6508255b28718252c18fc993936b9a26bca90d1c4376d10d20731a59c09f7c9b63415ab078ec56725a4fc9a5ecda4bcdf05647e5b08a49df3249761a9c3193710fab7a4bac8ceb1ec775ac8b97de5b85885bff3fa7df5a6d5260b841f3b29c80f68e6f3e1245d336cef23036ce3080811cf858dd04ea772e05b9760edc39f88ab71ea8a00eebd5f81212c91f8d6d0b0e767ef157ca8d9a7d9de390a3ed6466657032716fe265c5123f741d9980e8dff4e5b1e13e95f4cca936de556a4d9b6719d44eda468c63e8da74c93a64d791a8ebc69430a2fa12d636d50947405dbc663299f84c8f2bc3cbca4de84bf455558afc5953babffefc34ebebb95cad991bc9a5704590297c25c851000a5baabc9ab477de28e219f3f8ab972ec19977ec30830f48dc59351363a1ccf0dbb893a261209e696bee62223da3d330a7d939d8bf6c0936b1fb59d352efa47272719945554b642e8f3c2da93098acda52185919ee60a5947f1752fd9ca6a64d41b1fb76a7e965a642d4127fe80f94ba5578e735eeaf8b8f445b99ae6e5422a52e3098169aa50207c78291d2c22f323e6e0a5a76e8d86c933cef83e0a677bfe18babf2ba1b3936f29508a7f9d3e1be17510c48aa50875f63a46ab4f193b1be82189fdbddb79918babbe18539d63f25dc18419939e3fd8cfc128553cd87890e62d8bebb19c86f0c2a4edd5620a46718e2a73fea6fcc566b43b3a776029a166eab4db9e368967860e2a6b95a1694e6899e9019b99c01c8d30b071af9cd5ab4168c6fe28748a57ff79dc7990061c08811855c0ea6f109a49ba698c9376a09920f871419b2b4aa00f5e995beecd451519015045ac95b51e1b07c43da549f2b936a2c93e5abc4a4052d4ea18b6ad9ce99c72967ab729ae3435ca6f0f34cfed66a69d4740b65c181ac9fd1d73a1c13e83d967c2b38ccd9ba0bb4ad72033f2ecdd0f6a7eae99228d26e60c8827c87634b03ca10a9cdafa546ac2fb561d32aeddd1aa0a04797ca892ad19457bc716faf78b1c76808277c15c6324027536bf0611fce51489527cef644e2740bfd7a4fd167f516f2038cac2f802def3eabbebfbbf5c6969cf040c0d34fc13c1d34f24d6adf435d3cf0b7f77ecfa05cbfccfd45ce0f7f6b42c904e14b34ed9f674baa050ca381992fd3b03043aed809ffea56c4c43d8ad609c140640c7c060dff6158c8239ef58db8e3c1a2ce8e5f714b89cf3b029ca261aa70af17540fc9bfe95e6dde4d3ac2b22bb60bd1ec47b34e0997e6aece7b8b9aa2d20b5dd3bb81acb88563257aa2b9ab01bdbdd4152d8ae351dd310d6f038cb008fdc48e12251e2a33d99fbc7fb76abb48c0440380998802dfefe56a2409e1511bc29534479ebc427289745302fd61c506293eddb938a660d8a3562fce03ab66e598a03e06bac84a07b9e53eb280520cbf42efaea7deb175a0eb715af65917d6a29df646c768b720744743b893ada3ddf79948eb215aaf24d077f9e3e12c8dc565ccdc85bf07e85b08a142271bfd254b7384624ed548c1d9a1fc9f779c95a1f471ee9eca08b2bb0258cd4087793b467d8d49bbb02062d759c196e76b6249fd90cb72c72a3946ef3227f4e3e5cff9163101c43a4b192ce2c4c6f4583b2901514f220e4d54875c4f4115a298486f569d10e6b188fc678857284581bccd2f1cb240bf1b60728e1623747910ca055ec0a3a1c463b71fd003e59a7e1e2e3ee80311974f3e7c08a785c6c6a46b4abf28bdd11ac8c73520279afb533375c673296d574649018f005f65c8884812cf6a080baa27922e5589f8026f75bc1ae9140c937709f798e50881164f8a081d72e4a60a132870603dab8d63886c8257623185ae4e54159f63d205f2fef6d151d7995ca2e3e5dd8d38e25be1480fbe7491b346ea4e6de0ab436883c7bcddd71c4c70ef81bc93f80e8abe5a3691f9ae078cfc7d3fd1e36dce0a8f0fe19ee48eb3e4423aa5973a91736a35f9d993af0f154aa1e54f54590a06b5857ff6bc5a00710964deba9a7112d24e81036f663f2b6c676c75fa3c96d2371595686d8646999e59e06c149a6b2480ce3ef0dd976f0e484bcc91f1224e22637b0b2f99c3cef8dbec7b69aac53d5d5b1058505ad3c05e8b0a193ab45883ecc42518eba937a3e8a69b4125e30868f406e5a43dea492a6579102e7d94bba31566ac77af163ca35f5bc768cb674ecfca4b9c65a209192f69fd8796fe975b3eeb15a4854a49b60af606aa652ef773448d547d1d0abc63d7aa2771a5acf819d98e7dcb3fad242b5fb9a3a3444398f6fdb0c059eb37453d6db9587732c9f7685f31fe45521701571630f1b010aa210dd97cb6b92be9af167f6c8897c57eb87afcf76e09193dd234ac40514c56af0a8ad7ed6c458ade41d06e46aff895fa80bf0c5fa1ac4733be61bf0c6be3e097cc67b9d09df745f84fc747dd70f9bc3a69b555edebab0785e01fcf63e22e1bc5b83234125cbe8438026e8ac34117057ccaf9e74b9abf97b49fabe962f6d3797fc7c54f3575b08c9132d17d35a563ca5dd823c784647963ca516ec23b2f7e7eff11467016cc768c8b94a0aab18d8aaf6bdcfe8dfe365443fb68dfbd8ab4aca054cfa214062045dc10359cf970bc89d3d2763dbc561c54dc82d344abea699189b1471fabf7e407b3421c99e76aa2b7afd7ca92fe9695d8eb0186cf458b3c3d1d3ced2fe8cf6fa9d2c5af7de96d932345cee8752368e088bf2ed895e7d14421f46862ae588a2050550a85d1e320d2148340ed787b8320d4d9428b1fa77a8310d817b714b70aea6ff68dc5a81fc68968611069afd577db2cf737973455fbb1c32461c19446d9582194e1298f2ed4ae94035b2a114c3ac7e22e8af46c7efbccb5f5c0174c0cc98a2bb2f71adec745da535963ac5ea7765b0b28fa27797b1b8f85dfeee843484842936a4151c07d0a86fc1070216f68e391d796264f539986adf8f45a211a5be90e9ea4aecf293e4884ddd754ad538ee82b39317547e975901bfdafb6eaef31c33bb082c6cbfdaa150a980f2e6cfa3502a45bb6c97ebfe943321b7317168a5d3a330b7af41aa6393302c32ba4981c0afe63f4f41c7baa63e01808423d323d0287e60d937b82a0401f52f9ceec723c2cd6456ffd7935d59b86c416582c37eb294bed1c1c2e8ff8d8fff1c5dacf800646b5404c7707e4ebd90186aa02822e332c8c210706a64e0690de938741ecdcce8bb4e2715f6715c5cf702105331de601fea88042b0706b52a31ee452b0767f23abbe75d16f7168d9db3339bafb15cb562f357d90f368b16f56ec053bb049944e2133f35a194a6121246f2892c1c8a25571c592260fa884da16ea9db375cf440855e698a653344aa89c252c0e4daf19fc88f498a7da6456c51f2b03d65b87daa263963caf8ae4358e38c98379872064ed10f18930e74b6a197166dde1775015a478938e86f6e3c3d830fdefa327fb56bc123b44300539a9652b2079ebdac87afe831edcb28066b02e8aa9b0dcab160c2e3410ddf8a21a132d404e4e73fe12bf2681cf14c81d92edd574053d1f02b7ef68c5b65f13022675ce496c24cc68eb0751ac1d14e025df4c35e7d4f087ffa48b2548bc15477be54908e69184a446208651852f8d59954b9002dd363fcc7a678b263e961e6c5f252978a0549b9adb54c590de0a5274c88a9d076b18bf399d81ddeb278955883b32c98ff5d2f33bedebd9fe9039b7c0a1040503c5e3a093739d0b50d1e0124b9d7e0311fe66887561f9fdb162d40fc1a1f1edd1d09ea0d3b533db22fab629a6f0eca4a298bfc5a3e9b88fddd0a2d92f5726af03a02f6fc23b986a618d87322325b60cf220b5cbc707d54ed5943d7475b55d132ef5472e19a2b5a7acb1cedf6f794c646a339541cffb18003130d87c84c220ca0c608259b19b14ad1c60b4ca9fbc3839271876d858c39ad3fa6739ab533f7dd0d9be61647709ab2809d9821aa86bb88f8c453acebf7471d0b7fb8e2c12b0b1cae49fbab7dcc08e1baf9d624b997815347902cefc1a8bfa7dd1db8ed295744410f28a26fe9e1cf987e22d0f11691b16913dd60e9ff1167a40699009fab4ff510898f026d82649c3edc8a7108c68410c56b822ba365109f2b0a70f47b171cd0657ee452821738b3d402cf6e074f32a536134bde5da611d59820c56ee0042e1520dd901b152876c9c1df1a362c8e8c7ebf0b5fe4dd2e5917fa0c058162d9567706ea9274cc4196621c1c7da3ce54eea1c122249f92d79a18d681b32ee6e5a53aedaad23c70ed8e06ff52132ca0953c03c4a4b633e63d111b0b925afef3bb17380006a24f829f0441a56e635bb79b08cd8e2fc0a284d4f4f8499ab18b644ab0f2bd71a36060769d580a004d8c986de2cd3df0b32de3eb5ff8fa49d6ea23a692c65fab87e3fee0ec27b6343983aa1d4cbea025a6ebee36789244b33ff31ff4748574c7902c6969f95a19f8925b54176aa3859ff3a84cb1e56c01572e8247a11b3d11f23ee5276b0b89518ef3d2da410a6e68ef832e0c2fcd850de2e3759554d8dc76acc5d7d1f67f2fb34a985bc763b85bae1f3abf4ed3063368aae2b5b3379ecdcffc6a99ed156729cc072b06a61cb037a925d1fbfb2260363e334abe9fe8730c7edf2c0fadce2bd7cb062c16c956f36f851635cf96af881603dc5c40be9608a6f4fea6ad3009f698c1236ace21261778082212ff0cf21c582ffeb23aa213f0d9007d8432841f004f7215b69e815cdf763861aaf87c60271e5c1d0ed455e58fef6d04f8d9c9fd9caac9c15423941f691659d032f5698a199a675ca7d438dd1529cc3c0cbd325fd12b12e14b619da6affc7e391b3d1860b0176699b1741c80228652cf9b9e2619b9c626fa2e533bdf226e85a21f2ea6d02bb2676e46e0fc32854b7e9091f318edfe", 0x1000}, 0x1006) [ 188.432592][T10033] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. [ 188.452509][T10030] CPU: 1 PID: 10030 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 188.460433][T10030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.470491][T10030] Call Trace: [ 188.473791][T10030] dump_stack+0x1fb/0x318 [ 188.478132][T10030] should_fail+0x555/0x770 [ 188.482568][T10030] should_fail_alloc_page+0x55/0x60 [ 188.487769][T10030] prepare_alloc_pages+0x283/0x460 [ 188.492891][T10030] __alloc_pages_nodemask+0xb2/0x5d0 [ 188.498187][T10030] alloc_pages_current+0x2db/0x500 [ 188.503301][T10030] push_pipe+0x3b1/0x750 [ 188.507544][T10030] __pipe_get_pages+0x8b/0x390 [ 188.512303][T10030] ? __kmalloc_node+0x4d/0x60 [ 188.516975][T10030] iov_iter_get_pages_alloc+0x89b/0xc50 [ 188.522777][T10030] default_file_splice_read+0x10e/0x8d0 [ 188.528320][T10030] ? fsnotify+0x1318/0x13d0 [ 188.532832][T10030] ? security_file_permission+0x23c/0x350 [ 188.538546][T10030] ? rw_verify_area+0x1c2/0x360 [ 188.543394][T10030] ? __ia32_sys_tee+0xb0/0xb0 [ 188.548064][T10030] splice_direct_to_actor+0x39c/0xac0 [ 188.553427][T10030] ? do_splice_direct+0x330/0x330 [ 188.558460][T10030] do_splice_direct+0x200/0x330 [ 188.563308][T10030] ? security_file_permission+0xd0/0x350 [ 188.568938][T10030] do_sendfile+0x7e4/0xfd0 [ 188.573356][T10030] __x64_sys_sendfile64+0xfc/0x1b0 [ 188.578456][T10030] do_syscall_64+0xf7/0x1c0 [ 188.582945][T10030] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.588816][T10030] RIP: 0033:0x45a219 [ 188.592692][T10030] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 188.612292][T10030] RSP: 002b:00007f512f662c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 188.620689][T10030] RAX: ffffffffffffffda RBX: 00007f512f662c90 RCX: 000000000045a219 04:45:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x38, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 188.628646][T10030] RDX: 0000000020000040 RSI: 0000000000000004 RDI: 0000000000000003 [ 188.636596][T10030] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 188.644544][T10030] R10: 0000000000008001 R11: 0000000000000246 R12: 00007f512f6636d4 [ 188.652498][T10030] R13: 00000000004c7f94 R14: 00000000004de3b0 R15: 0000000000000008 04:45:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x38, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:30 executing program 4 (fault-call:7 fault-nth:5): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x38, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x3, 0x0, 0x267) 04:45:30 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x18, 0x32, 0x829, 0x0, 0x0, {0x4, 0x40000}, [@nested={0x4}]}, 0x18}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) listen(r0, 0x0) r1 = socket$inet(0x10, 0x80803, 0x4000000000000004) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001300ff09fffd06000000b70000ffff07000000000000683540150024001d001fc42e80b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) r2 = socket(0x10, 0x80002, 0x8000000010) sendmmsg$alg(r2, &(0x7f0000000080), 0x492492492492751, 0x0) 04:45:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x38, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 188.913189][T10059] FAULT_INJECTION: forcing a failure. [ 188.913189][T10059] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 188.943769][T10059] CPU: 1 PID: 10059 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 188.951697][T10059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.961752][T10059] Call Trace: [ 188.965063][T10059] dump_stack+0x1fb/0x318 [ 188.965082][T10059] should_fail+0x555/0x770 [ 188.965100][T10059] should_fail_alloc_page+0x55/0x60 [ 188.973829][T10059] prepare_alloc_pages+0x283/0x460 [ 188.973845][T10059] __alloc_pages_nodemask+0xb2/0x5d0 [ 188.973864][T10059] alloc_pages_current+0x2db/0x500 [ 188.973879][T10059] push_pipe+0x3b1/0x750 [ 188.973895][T10059] __pipe_get_pages+0x8b/0x390 [ 188.973905][T10059] ? __kmalloc_node+0x4d/0x60 [ 188.973920][T10059] iov_iter_get_pages_alloc+0x89b/0xc50 [ 188.973936][T10059] default_file_splice_read+0x10e/0x8d0 [ 189.019254][T10059] ? fsnotify+0x1318/0x13d0 [ 189.023744][T10059] ? security_file_permission+0x23c/0x350 [ 189.029440][T10059] ? rw_verify_area+0x1c2/0x360 [ 189.034266][T10059] ? __ia32_sys_tee+0xb0/0xb0 [ 189.038917][T10059] splice_direct_to_actor+0x39c/0xac0 [ 189.044262][T10059] ? do_splice_direct+0x330/0x330 [ 189.049269][T10059] do_splice_direct+0x200/0x330 [ 189.054099][T10059] ? security_file_permission+0xd0/0x350 [ 189.059704][T10059] do_sendfile+0x7e4/0xfd0 [ 189.064106][T10059] __x64_sys_sendfile64+0xfc/0x1b0 [ 189.069197][T10059] do_syscall_64+0xf7/0x1c0 [ 189.073680][T10059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.079558][T10059] RIP: 0033:0x45a219 [ 189.083429][T10059] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.103007][T10059] RSP: 002b:00007f512f641c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 189.111393][T10059] RAX: ffffffffffffffda RBX: 00007f512f641c90 RCX: 000000000045a219 [ 189.119427][T10059] RDX: 0000000020000040 RSI: 0000000000000004 RDI: 0000000000000003 [ 189.127982][T10059] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 189.135931][T10059] R10: 0000000000008001 R11: 0000000000000246 R12: 00007f512f6426d4 [ 189.143880][T10059] R13: 00000000004c7f94 R14: 00000000004de3b0 R15: 0000000000000008 04:45:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 189.186929][T10070] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 189.213587][T10070] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390100a9ceafd07e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:31 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}], 0x1, 0x0, 0x0, 0x0) 04:45:31 executing program 4 (fault-call:7 fault-nth:6): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:31 executing program 2: 04:45:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390100a9ceafd07e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x4, 0x0, 0x267) 04:45:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 189.517670][T10093] FAULT_INJECTION: forcing a failure. [ 189.517670][T10093] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:45:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0000000008000000002300de51f7a0b004b9edf2f1e5f8ea777292ee8f654533d0bdfc9fd26a0409b398835c7af271a98e953b2c3b5e7bb99bc7e2c0370cbc057f4d0071241f3f35ba7914f28739d808eb19439ed5fcc7889ac8aeee2aef482747590cadcaeb00f0ffffa506bfb32dc02b5633cf") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x5, 0x20}, &(0x7f0000000280)=0xc) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000002c0)={r2, 0x2, 0x95, "11319295bae77de2d6da178b0346b15ddd8271e7691ab18800f340c570849dd9badd020d8e87543dd25861d6c38f5949122ca5b8c3304e2654d7e7777951f6863634815cd2cbbe1663cefa623f4474f8d9351bdbdb98d67ffae093f221d94b2cbd23461de049f80c953088f6448db343a1c95f230d37334baa96632bb68969e56d1b91cfb0982998a1a91e6a098b77c83c32f2d536"}, 0x9d) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCRSSL2CALL(0xffffffffffffffff, 0x89e2, &(0x7f0000000380)=@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="ee0000003340190125bd00000000000004000000"], 0x14}, 0x1, 0xf0ffff}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_EDIT(r5, 0x0, 0x483, &(0x7f0000000080)={0x3b, @multicast2, 0x4e20, 0x2, 'sed\x00', 0x4, 0x7, 0x2b}, 0x2c) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000200)) [ 189.559203][T10096] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 189.576968][T10096] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. [ 189.600298][T10093] CPU: 1 PID: 10093 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 189.608222][T10093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.618281][T10093] Call Trace: [ 189.621579][T10093] dump_stack+0x1fb/0x318 [ 189.625915][T10093] should_fail+0x555/0x770 [ 189.630327][T10093] should_fail_alloc_page+0x55/0x60 [ 189.635526][T10093] prepare_alloc_pages+0x283/0x460 [ 189.640639][T10093] __alloc_pages_nodemask+0xb2/0x5d0 [ 189.645917][T10093] alloc_pages_current+0x2db/0x500 [ 189.651012][T10093] push_pipe+0x3b1/0x750 [ 189.655237][T10093] __pipe_get_pages+0x8b/0x390 [ 189.659978][T10093] ? __kmalloc_node+0x4d/0x60 [ 189.664648][T10093] iov_iter_get_pages_alloc+0x89b/0xc50 [ 189.670192][T10093] default_file_splice_read+0x10e/0x8d0 [ 189.675721][T10093] ? fsnotify+0x1318/0x13d0 [ 189.680214][T10093] ? security_file_permission+0x23c/0x350 [ 189.685912][T10093] ? rw_verify_area+0x1c2/0x360 [ 189.690738][T10093] ? __ia32_sys_tee+0xb0/0xb0 [ 189.695390][T10093] splice_direct_to_actor+0x39c/0xac0 [ 189.700735][T10093] ? do_splice_direct+0x330/0x330 [ 189.705742][T10093] do_splice_direct+0x200/0x330 [ 189.710570][T10093] ? security_file_permission+0xd0/0x350 [ 189.716178][T10093] do_sendfile+0x7e4/0xfd0 [ 189.720580][T10093] __x64_sys_sendfile64+0xfc/0x1b0 [ 189.725670][T10093] do_syscall_64+0xf7/0x1c0 [ 189.730153][T10093] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.736025][T10093] RIP: 0033:0x45a219 [ 189.739899][T10093] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:45:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 189.759579][T10093] RSP: 002b:00007f512f662c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 189.767976][T10093] RAX: ffffffffffffffda RBX: 00007f512f662c90 RCX: 000000000045a219 [ 189.775925][T10093] RDX: 0000000020000040 RSI: 0000000000000004 RDI: 0000000000000003 [ 189.783874][T10093] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 189.791837][T10093] R10: 0000000000008001 R11: 0000000000000246 R12: 00007f512f6636d4 [ 189.799788][T10093] R13: 00000000004c7f94 R14: 00000000004de3b0 R15: 0000000000000008 04:45:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:31 executing program 4 (fault-call:7 fault-nth:7): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x5, 0x0, 0x267) [ 189.979043][T10114] FAULT_INJECTION: forcing a failure. [ 189.979043][T10114] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 190.073687][T10114] CPU: 1 PID: 10114 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 190.081612][T10114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.091684][T10114] Call Trace: [ 190.094968][T10114] dump_stack+0x1fb/0x318 [ 190.099279][T10114] should_fail+0x555/0x770 [ 190.103676][T10114] should_fail_alloc_page+0x55/0x60 [ 190.108849][T10114] prepare_alloc_pages+0x283/0x460 [ 190.113941][T10114] __alloc_pages_nodemask+0xb2/0x5d0 [ 190.119208][T10114] alloc_pages_current+0x2db/0x500 [ 190.124299][T10114] push_pipe+0x3b1/0x750 [ 190.128523][T10114] __pipe_get_pages+0x8b/0x390 [ 190.133699][T10114] ? __kmalloc_node+0x4d/0x60 [ 190.138353][T10114] iov_iter_get_pages_alloc+0x89b/0xc50 [ 190.143879][T10114] default_file_splice_read+0x10e/0x8d0 [ 190.149403][T10114] ? fsnotify+0x1318/0x13d0 [ 190.153890][T10114] ? security_file_permission+0x23c/0x350 [ 190.159604][T10114] ? rw_verify_area+0x1c2/0x360 [ 190.164430][T10114] ? __ia32_sys_tee+0xb0/0xb0 [ 190.169084][T10114] splice_direct_to_actor+0x39c/0xac0 [ 190.174431][T10114] ? do_splice_direct+0x330/0x330 [ 190.179440][T10114] do_splice_direct+0x200/0x330 [ 190.184283][T10114] ? security_file_permission+0xd0/0x350 [ 190.189891][T10114] do_sendfile+0x7e4/0xfd0 [ 190.194293][T10114] __x64_sys_sendfile64+0xfc/0x1b0 [ 190.199385][T10114] do_syscall_64+0xf7/0x1c0 [ 190.203867][T10114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.209735][T10114] RIP: 0033:0x45a219 [ 190.213604][T10114] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 190.233184][T10114] RSP: 002b:00007f512f662c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 190.241569][T10114] RAX: ffffffffffffffda RBX: 00007f512f662c90 RCX: 000000000045a219 [ 190.249516][T10114] RDX: 0000000020000040 RSI: 0000000000000004 RDI: 0000000000000003 [ 190.257466][T10114] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 190.265414][T10114] R10: 0000000000008001 R11: 0000000000000246 R12: 00007f512f6636d4 [ 190.273371][T10114] R13: 00000000004c7f94 R14: 00000000004de3b0 R15: 0000000000000008 04:45:32 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}], 0x1, 0x0, 0x0, 0x0) 04:45:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:32 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() r1 = accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000200)=0x1c, 0xc1800) sendmmsg$sock(r1, &(0x7f0000001880)=[{{&(0x7f0000000300)=@pptp={0x18, 0x2, {0x3, @rand_addr=0x5}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000380)="95dbc95824a57c4506487dff70c0502980d45bdf201325ea98dea3898352888d5618fac8bc9606bec7e5fd8b7dfa32b0cfc88b974791ae8a54d65e3cdb24b8c0ff698cac63a63e01dd5216b01b48f8832305ef995c482a70fa6db4aac055dfe1f6", 0x61}, {&(0x7f0000000400)="b17977cd35fc26ab90a890ee34ef9aa0a23c43227e32525e366ee81d1822b5e74b1b20786a1ac0042303fdf41ef30122a4e59e7e880e83f0eb69d303b6cb7c3b526a93b8d418359acf0fc737d3ad8dbf5ae35375484011534fb9f1d66066913d5077dd5ce93908e82749", 0x6a}], 0x2}}, {{&(0x7f0000000540)=@in6={0xa, 0x4e22, 0x8, @mcast2, 0x2}, 0x80, &(0x7f0000000680)=[{&(0x7f00000005c0)="de4651b9779c5552a8dfd5044801d551eab8ed55704e35b6472bc3706b1eb14e47460ec18419e6623530c2ea51a99918387e6143151837dda4677f99749b62fdd50cbe465e2c6856e0778607a32088e2664be8019a5e81de5b16a3589a990c1019500c2adf4be4f696a2721f93c11891cf760bd0b017e3fd6af9eb77b7f4b3a4c36ffb318cba8697867fbf4ef5ac5caa0ddf678ebb66772672c50e0626a3e9eda1ff01a33ac75020701d0b627b58d0b8f932471dce", 0xb5}], 0x1, &(0x7f00000006c0)=[@txtime={{0x18, 0x1, 0x3d, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x101}}, @timestamping={{0x14, 0x1, 0x25, 0x7fff}}], 0x60}}, {{&(0x7f0000000740)=@ax25={{0x3, @null, 0x1}, [@bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f0000000a00)=[{&(0x7f00000007c0)="41f9835f2ac20a1a0d7f26c87141a14d39b91027f1451c620a3735a47b99deea67877cb01abc9b4c61e28928347fea4a88f36e528d4d1a27eae02aa616b82f476bd44ab8229ff4c94fee0196dfd503759b8b7e7dde0a968eb85dfa8e10ef24a6a28665ae5784e9db74f859239151d71197d34c3c272d35410943e239f2da7955302799ea8910e3d2f6a2e9451f458c726bca43393d5d9718f30a4070680c7d3f55ca98ca1a9d3ca21285b4de4214ed9e79870a8cb31b71f2dcf30bb69827f53b50a64eb8517442775e3e7f5e7f101fdaaa", 0xd1}, {&(0x7f00000008c0)="97d2954c49f838168c2e7b40b510b12110a43a56465f739194fdae4e42f7646d2b71", 0x22}, {&(0x7f0000000900)="b5293bfd8901cd35424a2c43c0d77da0dc935c16", 0x14}, {&(0x7f0000000940)="8728459f80a32d24db11a32ac66560954e5c5df6c570ce2be6fa239e787e4fa966a2d9e744d391b481fbb299ef6c5298d7484d52a502965b383d2fe498ed1995d8a825c1967e882dd137164a2b97de338f7def0f569f4b6e9f4fa05f2150c048f89c17b86436ca3a95eb95ae763930ac16e0d4228e12e523967a9118f039053cc59b464b38d156f1937bbccfa754764e5cbd73", 0x93}], 0x4, &(0x7f0000000a40)=[@timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0xfffffff9}}, @timestamping={{0x14, 0x1, 0x25, 0x3f}}], 0x90}}, {{&(0x7f0000000b00)=@un=@abs={0x0, 0x0, 0x4e20}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b80)="8a635515b391f93d79dfb36749a01cf90f1b14f62767b86d0564c5d4143587d219fa281a7d6d9c38a4c1183950fea4d01ba161704e10d45ce63319e4c0d8", 0x3e}], 0x1, &(0x7f0000000c00)=[@timestamping={{0x14, 0x1, 0x25, 0xc382}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @mark={{0x14, 0x1, 0x24, 0xffff}}, @txtime={{0x18}}, @timestamping={{0x14, 0x1, 0x25, 0x1000}}, @mark={{0x14}}, @txtime={{0x18}}, @mark={{0x14, 0x1, 0x24, 0x4}}], 0xc0}}, {{&(0x7f0000000cc0)=@pptp={0x18, 0x2, {0x3, @multicast2}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000d40)="6c17740abe5a8f5c085084a09895adf800888ccde518ec9fa4e055730155a6d4f41cf8003a27", 0x26}, {&(0x7f0000000d80)="327500822c1c1e14c92d6084b9a08432626fa839cf03c121a8d020807011105368ea2c9aa6e095129ca5abca11dadb3b52e7e70494565598336772b316833e79bd7eb1cb1df34194436d0c3524", 0x4d}, {&(0x7f0000000e00)="d0c0a45b719dd7b044670e4a6ec02dd5c96bac3dbbf18b83a9a8e1871e5c3d76b63c4b7f3cab5d6a772791357d3150381f01017726bb3bb15c0e16b8f6f5a7c458dd8a2b2df2b086b4c957ab9fb7231438a75c5c1e17a13923f4", 0x5a}, {&(0x7f0000000e80)="6cbd2418e8edc61f6c7ac0317cfe42e1e99b4852366f0448e252b4433e05c118d4c1c982efe075d550774f66d6689b3d378af48aad816ff2f14a82821c1d9e4583d5fb88f3b1c573a75022c7eded6234744a956a51239fe850ca736d9a48aaa1c9a95c910507b40428cfb8033680f95c01eed7d8640503720d33a5ba95eab6591937d1eae773596cdef7e03e3483de598ec9eb92f23356a3e4f7b5b98327baabb39af6ddf349eb600988f00a7d9eb94b041d15e8e2a5c7f2eb2fefa17e6c4a0f0a06780d9bc29ed136ae5a2bfe", 0xcd}], 0x4, &(0x7f0000000fc0)=[@mark={{0x14, 0x1, 0x24, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x10f0}}], 0x60}}, {{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000001040)="8b5e149e3a337244e420a4433d1ba808f03f8af77edda36cabfe5da1048e39a72e5b0ae69cd87f318ee3197c95d428a465fa4eee000d274aa58b1afc4cdd5dbb735d517982e1bb40df1aa56c18b0d72479709a1ebe0e6f6d5a90cc952eff0a3fd2944804ea5202c926071d4c9ea5c91ac54c5bb6dccb1853a67d0bff0ac9e0712406fc2026a5f0c6a20218911b1ed23e75392349da81c9b619bb98", 0x9b}, {&(0x7f0000001100)="c4534445b52187568b7f080764de7f6c0b199ccbf932aa4006f4", 0x1a}, {&(0x7f0000001140)="d814adbabd4f892000cd6cde7676087f1d521d6b015759d0367f84911c75cbb30dd7c0c2ffdc5c1f5e6e633a35687f66494affd6c9300ac0172302af30ac9b30de003c2a38b3114cc054cab1dbc8efa12cb1c6f3b5bfd4516e6efad8ceb581f75587a429f277b06c60c1ea8ae1279c89e04bad6fc1c68b98", 0x78}, {&(0x7f00000011c0)="23ff6e394084f4bd665e21974b870e020f9e7161c6cc595bf416b2690415d15f6be76dd1ca2c20e20782c33093ae57666acb8c713106b9229b6b0d3f516d1dd240c9e99381de7e1ba30bfbafe8a309123b1c9b89d0bf4248cfa18af9c7c5a31686669cf37967f7f1876d7badc318d3880338a80b061afd67376299c71ab0aa7b0750f3b05787a66d5a6e4d10158e9dfb64a5dcd8c6eb46aef5645e19327d92d273937a9ed73721889e655d5947a70fe389958e83fe59c86daa7858f593f14855d694a2467646877e83b522bed3aba9153505d49093e59884", 0xd8}, {&(0x7f0000002080)="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", 0x1000}, {&(0x7f00000012c0)="d34c42b5890a8b5f1aab015315ee4fd3831421866179f94397c23dc027d5037106e9c4fe5f148f7c673c5fad8adf97deb062154fd6e0ed8418419141a2bafe95f05e3902a8c1592f7f1690ddd359f0d99e11175aa70f0011a9db40960d3302ffc92e945e63c4786bf54ca7efd023a732d8e07c605fedf7cdb70f537f6d5d", 0x7e}, {&(0x7f0000001340)="97fedc4810e4c1fc4cabd793bb82c34e0926da666b64cf0770a8ba23d49fd3647ac399b7b8fffce7fb7441e73154ebc6cd2cb08c2bad1cb79fa77766d2038a93", 0x40}, {&(0x7f0000001380)="45940727decd1fc10c1254d53f67ce8f12ed385cbc0c8072ed797ca4edfd634c5e6ece5c69c0ee5357068d91cdbfa4b9b8928083974ebe3b60f53ccbf28b025b836ca4bfe8ec57082854e69415e655bbfd07bfc6652effb4ec0ac51822b1fd999c623127a4481519e98c54e8e1c13e3aec83e7b3499caede09f8f73c9fe9c128d925a6823873319a92cfce0a93874b5dde2875115ad93c05781b2b2f171caa0047379845839f7a07aa16588b972397fe656b69ad677991c1316035fa1f97e7878f7ee8bf4dcc5cba89a3c599c41e699f45160b4b9be660e9558279f5b06c3c5c8d5842463b6f635c7193406d080ddeff1fc8af98", 0xf4}], 0x8, &(0x7f0000001500)=[@txtime={{0x18, 0x1, 0x3d, 0x25cd}}, @txtime={{0x18, 0x1, 0x3d, 0x7fff}}], 0x30}}, {{&(0x7f0000001540)=@vsock={0x28, 0x0, 0x2711, @hyper}, 0x80, &(0x7f00000017c0)=[{&(0x7f00000015c0)="f75b811804a20b807d3a776de02ae7d00a8f59a2a9bacec203b9ae5b3ae8eb8b9aad1b0af50d446be525d02b979433f4c0a85f85271eff6c1b0564b2ac4c2cf7d5d43ee6c90491923002fc6602db1ff064b73ec9f113294ba6c4eb3d34fe6260ee4304744a3cd42940533689582dc7ff9cc95acd947fce25c718e194c3", 0x7d}, {&(0x7f0000001640)="d7255039faac4ea256d53cd567698890bd5b2d51f3c8eeaf4438a30b7a417b3007c060a2ddad875e745b22f612f4e7d1e9c7271ba1c93fe55c35e7bd677c030001df0efe748738b5f7fe2011609f468b622cc43343455c1807c7c7e36b8d6aec217b0671907392099c9c6b42c39734a5e53fe3eb87d9fb190e2fb26abb038c9bdbc36698e0afa1fba6414c8102a43d97c9a33215d486665a89a314ded844faee40b3497c76488e333dc752661339e4d2860fee033b49f90a3911d65c5745b1ea946820c6572ba893a4fd", 0xca}, {&(0x7f0000001740)="b4730bc5f4964bf81ed9d1f9ff920f533b37dcfde5292b436db716480a104aab025bcb20dc965c7bd7cea2e8e40cef1bd8b05f4e5a05bbc3d14bc1b1ca74650067ff91b72f2e78", 0x47}], 0x3, &(0x7f0000001800)=[@mark={{0x14, 0x1, 0x24, 0x89}}, @timestamping={{0x14, 0x1, 0x25, 0x100}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}], 0x60}}], 0x7, 0x8001) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) ioctl$HDIO_GETGEO(r2, 0x301, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$vbi(&(0x7f0000001a40)='/dev/vbi#\x00', 0x1, 0x2) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="3f02000000000003400001000000000000000b0000000014001462726f6164636173742d6c696e6b0000"], 0x30}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r5, &(0x7f0000001b40)={&(0x7f0000001a80)={0x10, 0x0, 0x0, 0x3a714fe84351708}, 0xc, &(0x7f0000001b00)={&(0x7f0000001ac0)={0x1c, r7, 0x10, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1004c035}, 0x8000) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) 04:45:32 executing program 4 (fault-call:7 fault-nth:8): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 190.424203][T10129] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 190.444101][T10129] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. [ 190.515405][T10142] FAULT_INJECTION: forcing a failure. [ 190.515405][T10142] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 190.552999][T10142] CPU: 1 PID: 10142 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 190.560936][T10142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.570991][T10142] Call Trace: [ 190.574273][T10142] dump_stack+0x1fb/0x318 [ 190.578584][T10142] should_fail+0x555/0x770 [ 190.582987][T10142] should_fail_alloc_page+0x55/0x60 [ 190.591151][T10142] prepare_alloc_pages+0x283/0x460 [ 190.596248][T10142] __alloc_pages_nodemask+0xb2/0x5d0 [ 190.601524][T10142] alloc_pages_current+0x2db/0x500 [ 190.606621][T10142] push_pipe+0x3b1/0x750 [ 190.610850][T10142] __pipe_get_pages+0x8b/0x390 [ 190.615595][T10142] ? __kmalloc_node+0x4d/0x60 [ 190.620271][T10142] iov_iter_get_pages_alloc+0x89b/0xc50 [ 190.625800][T10142] default_file_splice_read+0x10e/0x8d0 [ 190.631326][T10142] ? fsnotify+0x1318/0x13d0 [ 190.635812][T10142] ? security_file_permission+0x23c/0x350 [ 190.641511][T10142] ? rw_verify_area+0x1c2/0x360 [ 190.646352][T10142] ? __ia32_sys_tee+0xb0/0xb0 [ 190.651022][T10142] splice_direct_to_actor+0x39c/0xac0 [ 190.656369][T10142] ? do_splice_direct+0x330/0x330 [ 190.661395][T10142] do_splice_direct+0x200/0x330 [ 190.666223][T10142] ? security_file_permission+0xd0/0x350 [ 190.671830][T10142] do_sendfile+0x7e4/0xfd0 [ 190.676235][T10142] __x64_sys_sendfile64+0xfc/0x1b0 [ 190.681326][T10142] do_syscall_64+0xf7/0x1c0 [ 190.685807][T10142] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.691674][T10142] RIP: 0033:0x45a219 [ 190.695544][T10142] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 190.715131][T10142] RSP: 002b:00007f512f641c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 190.723517][T10142] RAX: ffffffffffffffda RBX: 00007f512f641c90 RCX: 000000000045a219 [ 190.731469][T10142] RDX: 0000000020000040 RSI: 0000000000000004 RDI: 0000000000000003 [ 190.739424][T10142] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 190.747383][T10142] R10: 0000000000008001 R11: 0000000000000246 R12: 00007f512f6426d4 [ 190.755333][T10142] R13: 00000000004c7f94 R14: 00000000004de3b0 R15: 0000000000000008 04:45:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x6, 0x0, 0x267) 04:45:33 executing program 4 (fault-call:7 fault-nth:9): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 191.144154][T10155] FAULT_INJECTION: forcing a failure. [ 191.144154][T10155] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:45:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390100a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 191.201614][T10155] CPU: 0 PID: 10155 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 191.209536][T10155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.219582][T10155] Call Trace: [ 191.219600][T10155] dump_stack+0x1fb/0x318 [ 191.219616][T10155] should_fail+0x555/0x770 [ 191.219633][T10155] should_fail_alloc_page+0x55/0x60 [ 191.227229][T10155] prepare_alloc_pages+0x283/0x460 [ 191.227245][T10155] __alloc_pages_nodemask+0xb2/0x5d0 [ 191.227267][T10155] alloc_pages_current+0x2db/0x500 [ 191.227283][T10155] push_pipe+0x3b1/0x750 [ 191.256556][T10155] __pipe_get_pages+0x8b/0x390 [ 191.261320][T10155] ? __kmalloc_node+0x4d/0x60 [ 191.261339][T10155] iov_iter_get_pages_alloc+0x89b/0xc50 [ 191.261355][T10155] default_file_splice_read+0x10e/0x8d0 [ 191.261372][T10155] ? fsnotify+0x1318/0x13d0 [ 191.277092][T10155] ? security_file_permission+0x23c/0x350 [ 191.277108][T10155] ? rw_verify_area+0x1c2/0x360 [ 191.277120][T10155] ? __ia32_sys_tee+0xb0/0xb0 [ 191.277131][T10155] splice_direct_to_actor+0x39c/0xac0 [ 191.277139][T10155] ? do_splice_direct+0x330/0x330 [ 191.277160][T10155] do_splice_direct+0x200/0x330 [ 191.311973][T10155] ? security_file_permission+0xd0/0x350 [ 191.317592][T10155] do_sendfile+0x7e4/0xfd0 [ 191.321996][T10155] __x64_sys_sendfile64+0xfc/0x1b0 [ 191.327091][T10155] do_syscall_64+0xf7/0x1c0 [ 191.331581][T10155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.337467][T10155] RIP: 0033:0x45a219 [ 191.341343][T10155] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 191.360927][T10155] RSP: 002b:00007f512f662c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 191.369330][T10155] RAX: ffffffffffffffda RBX: 00007f512f662c90 RCX: 000000000045a219 [ 191.377281][T10155] RDX: 0000000020000040 RSI: 0000000000000004 RDI: 0000000000000003 [ 191.385229][T10155] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 191.393176][T10155] R10: 0000000000008001 R11: 0000000000000246 R12: 00007f512f6636d4 04:45:33 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() r1 = accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000200)=0x1c, 0xc1800) sendmmsg$sock(r1, &(0x7f0000001880)=[{{&(0x7f0000000300)=@pptp={0x18, 0x2, {0x3, @rand_addr=0x5}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000380)="95dbc95824a57c4506487dff70c0502980d45bdf201325ea98dea3898352888d5618fac8bc9606bec7e5fd8b7dfa32b0cfc88b974791ae8a54d65e3cdb24b8c0ff698cac63a63e01dd5216b01b48f8832305ef995c482a70fa6db4aac055dfe1f6", 0x61}, {&(0x7f0000000400)="b17977cd35fc26ab90a890ee34ef9aa0a23c43227e32525e366ee81d1822b5e74b1b20786a1ac0042303fdf41ef30122a4e59e7e880e83f0eb69d303b6cb7c3b526a93b8d418359acf0fc737d3ad8dbf5ae35375484011534fb9f1d66066913d5077dd5ce93908e82749", 0x6a}], 0x2}}, {{&(0x7f0000000540)=@in6={0xa, 0x4e22, 0x8, @mcast2, 0x2}, 0x80, &(0x7f0000000680)=[{&(0x7f00000005c0)="de4651b9779c5552a8dfd5044801d551eab8ed55704e35b6472bc3706b1eb14e47460ec18419e6623530c2ea51a99918387e6143151837dda4677f99749b62fdd50cbe465e2c6856e0778607a32088e2664be8019a5e81de5b16a3589a990c1019500c2adf4be4f696a2721f93c11891cf760bd0b017e3fd6af9eb77b7f4b3a4c36ffb318cba8697867fbf4ef5ac5caa0ddf678ebb66772672c50e0626a3e9eda1ff01a33ac75020701d0b627b58d0b8f932471dce", 0xb5}], 0x1, &(0x7f00000006c0)=[@txtime={{0x18, 0x1, 0x3d, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x101}}, @timestamping={{0x14, 0x1, 0x25, 0x7fff}}], 0x60}}, {{&(0x7f0000000740)=@ax25={{0x3, @null, 0x1}, [@bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f0000000a00)=[{&(0x7f00000007c0)="41f9835f2ac20a1a0d7f26c87141a14d39b91027f1451c620a3735a47b99deea67877cb01abc9b4c61e28928347fea4a88f36e528d4d1a27eae02aa616b82f476bd44ab8229ff4c94fee0196dfd503759b8b7e7dde0a968eb85dfa8e10ef24a6a28665ae5784e9db74f859239151d71197d34c3c272d35410943e239f2da7955302799ea8910e3d2f6a2e9451f458c726bca43393d5d9718f30a4070680c7d3f55ca98ca1a9d3ca21285b4de4214ed9e79870a8cb31b71f2dcf30bb69827f53b50a64eb8517442775e3e7f5e7f101fdaaa", 0xd1}, {&(0x7f00000008c0)="97d2954c49f838168c2e7b40b510b12110a43a56465f739194fdae4e42f7646d2b71", 0x22}, {&(0x7f0000000900)="b5293bfd8901cd35424a2c43c0d77da0dc935c16", 0x14}, {&(0x7f0000000940)="8728459f80a32d24db11a32ac66560954e5c5df6c570ce2be6fa239e787e4fa966a2d9e744d391b481fbb299ef6c5298d7484d52a502965b383d2fe498ed1995d8a825c1967e882dd137164a2b97de338f7def0f569f4b6e9f4fa05f2150c048f89c17b86436ca3a95eb95ae763930ac16e0d4228e12e523967a9118f039053cc59b464b38d156f1937bbccfa754764e5cbd73", 0x93}], 0x4, &(0x7f0000000a40)=[@timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0xfffffff9}}, @timestamping={{0x14, 0x1, 0x25, 0x3f}}], 0x90}}, {{&(0x7f0000000b00)=@un=@abs={0x0, 0x0, 0x4e20}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b80)="8a635515b391f93d79dfb36749a01cf90f1b14f62767b86d0564c5d4143587d219fa281a7d6d9c38a4c1183950fea4d01ba161704e10d45ce63319e4c0d8", 0x3e}], 0x1, &(0x7f0000000c00)=[@timestamping={{0x14, 0x1, 0x25, 0xc382}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @mark={{0x14, 0x1, 0x24, 0xffff}}, @txtime={{0x18}}, @timestamping={{0x14, 0x1, 0x25, 0x1000}}, @mark={{0x14}}, @txtime={{0x18}}, @mark={{0x14, 0x1, 0x24, 0x4}}], 0xc0}}, {{&(0x7f0000000cc0)=@pptp={0x18, 0x2, {0x3, @multicast2}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000d40)="6c17740abe5a8f5c085084a09895adf800888ccde518ec9fa4e055730155a6d4f41cf8003a27", 0x26}, {&(0x7f0000000d80)="327500822c1c1e14c92d6084b9a08432626fa839cf03c121a8d020807011105368ea2c9aa6e095129ca5abca11dadb3b52e7e70494565598336772b316833e79bd7eb1cb1df34194436d0c3524", 0x4d}, {&(0x7f0000000e00)="d0c0a45b719dd7b044670e4a6ec02dd5c96bac3dbbf18b83a9a8e1871e5c3d76b63c4b7f3cab5d6a772791357d3150381f01017726bb3bb15c0e16b8f6f5a7c458dd8a2b2df2b086b4c957ab9fb7231438a75c5c1e17a13923f4", 0x5a}, {&(0x7f0000000e80)="6cbd2418e8edc61f6c7ac0317cfe42e1e99b4852366f0448e252b4433e05c118d4c1c982efe075d550774f66d6689b3d378af48aad816ff2f14a82821c1d9e4583d5fb88f3b1c573a75022c7eded6234744a956a51239fe850ca736d9a48aaa1c9a95c910507b40428cfb8033680f95c01eed7d8640503720d33a5ba95eab6591937d1eae773596cdef7e03e3483de598ec9eb92f23356a3e4f7b5b98327baabb39af6ddf349eb600988f00a7d9eb94b041d15e8e2a5c7f2eb2fefa17e6c4a0f0a06780d9bc29ed136ae5a2bfe", 0xcd}], 0x4, &(0x7f0000000fc0)=[@mark={{0x14, 0x1, 0x24, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x10f0}}], 0x60}}, {{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000001040)="8b5e149e3a337244e420a4433d1ba808f03f8af77edda36cabfe5da1048e39a72e5b0ae69cd87f318ee3197c95d428a465fa4eee000d274aa58b1afc4cdd5dbb735d517982e1bb40df1aa56c18b0d72479709a1ebe0e6f6d5a90cc952eff0a3fd2944804ea5202c926071d4c9ea5c91ac54c5bb6dccb1853a67d0bff0ac9e0712406fc2026a5f0c6a20218911b1ed23e75392349da81c9b619bb98", 0x9b}, {&(0x7f0000001100)="c4534445b52187568b7f080764de7f6c0b199ccbf932aa4006f4", 0x1a}, {&(0x7f0000001140)="d814adbabd4f892000cd6cde7676087f1d521d6b015759d0367f84911c75cbb30dd7c0c2ffdc5c1f5e6e633a35687f66494affd6c9300ac0172302af30ac9b30de003c2a38b3114cc054cab1dbc8efa12cb1c6f3b5bfd4516e6efad8ceb581f75587a429f277b06c60c1ea8ae1279c89e04bad6fc1c68b98", 0x78}, {&(0x7f00000011c0)="23ff6e394084f4bd665e21974b870e020f9e7161c6cc595bf416b2690415d15f6be76dd1ca2c20e20782c33093ae57666acb8c713106b9229b6b0d3f516d1dd240c9e99381de7e1ba30bfbafe8a309123b1c9b89d0bf4248cfa18af9c7c5a31686669cf37967f7f1876d7badc318d3880338a80b061afd67376299c71ab0aa7b0750f3b05787a66d5a6e4d10158e9dfb64a5dcd8c6eb46aef5645e19327d92d273937a9ed73721889e655d5947a70fe389958e83fe59c86daa7858f593f14855d694a2467646877e83b522bed3aba9153505d49093e59884", 0xd8}, {&(0x7f0000002080)="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", 0x1000}, {&(0x7f00000012c0)="d34c42b5890a8b5f1aab015315ee4fd3831421866179f94397c23dc027d5037106e9c4fe5f148f7c673c5fad8adf97deb062154fd6e0ed8418419141a2bafe95f05e3902a8c1592f7f1690ddd359f0d99e11175aa70f0011a9db40960d3302ffc92e945e63c4786bf54ca7efd023a732d8e07c605fedf7cdb70f537f6d5d", 0x7e}, {&(0x7f0000001340)="97fedc4810e4c1fc4cabd793bb82c34e0926da666b64cf0770a8ba23d49fd3647ac399b7b8fffce7fb7441e73154ebc6cd2cb08c2bad1cb79fa77766d2038a93", 0x40}, {&(0x7f0000001380)="45940727decd1fc10c1254d53f67ce8f12ed385cbc0c8072ed797ca4edfd634c5e6ece5c69c0ee5357068d91cdbfa4b9b8928083974ebe3b60f53ccbf28b025b836ca4bfe8ec57082854e69415e655bbfd07bfc6652effb4ec0ac51822b1fd999c623127a4481519e98c54e8e1c13e3aec83e7b3499caede09f8f73c9fe9c128d925a6823873319a92cfce0a93874b5dde2875115ad93c05781b2b2f171caa0047379845839f7a07aa16588b972397fe656b69ad677991c1316035fa1f97e7878f7ee8bf4dcc5cba89a3c599c41e699f45160b4b9be660e9558279f5b06c3c5c8d5842463b6f635c7193406d080ddeff1fc8af98", 0xf4}], 0x8, &(0x7f0000001500)=[@txtime={{0x18, 0x1, 0x3d, 0x25cd}}, @txtime={{0x18, 0x1, 0x3d, 0x7fff}}], 0x30}}, {{&(0x7f0000001540)=@vsock={0x28, 0x0, 0x2711, @hyper}, 0x80, &(0x7f00000017c0)=[{&(0x7f00000015c0)="f75b811804a20b807d3a776de02ae7d00a8f59a2a9bacec203b9ae5b3ae8eb8b9aad1b0af50d446be525d02b979433f4c0a85f85271eff6c1b0564b2ac4c2cf7d5d43ee6c90491923002fc6602db1ff064b73ec9f113294ba6c4eb3d34fe6260ee4304744a3cd42940533689582dc7ff9cc95acd947fce25c718e194c3", 0x7d}, {&(0x7f0000001640)="d7255039faac4ea256d53cd567698890bd5b2d51f3c8eeaf4438a30b7a417b3007c060a2ddad875e745b22f612f4e7d1e9c7271ba1c93fe55c35e7bd677c030001df0efe748738b5f7fe2011609f468b622cc43343455c1807c7c7e36b8d6aec217b0671907392099c9c6b42c39734a5e53fe3eb87d9fb190e2fb26abb038c9bdbc36698e0afa1fba6414c8102a43d97c9a33215d486665a89a314ded844faee40b3497c76488e333dc752661339e4d2860fee033b49f90a3911d65c5745b1ea946820c6572ba893a4fd", 0xca}, {&(0x7f0000001740)="b4730bc5f4964bf81ed9d1f9ff920f533b37dcfde5292b436db716480a104aab025bcb20dc965c7bd7cea2e8e40cef1bd8b05f4e5a05bbc3d14bc1b1ca74650067ff91b72f2e78", 0x47}], 0x3, &(0x7f0000001800)=[@mark={{0x14, 0x1, 0x24, 0x89}}, @timestamping={{0x14, 0x1, 0x25, 0x100}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}], 0x60}}], 0x7, 0x8001) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) ioctl$HDIO_GETGEO(r2, 0x301, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$vbi(&(0x7f0000001a40)='/dev/vbi#\x00', 0x1, 0x2) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="3f02000000000003400001000000000000000b0000000014001462726f6164636173742d6c696e6b0000"], 0x30}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r5, &(0x7f0000001b40)={&(0x7f0000001a80)={0x10, 0x0, 0x0, 0x3a714fe84351708}, 0xc, &(0x7f0000001b00)={&(0x7f0000001ac0)={0x1c, r7, 0x10, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1004c035}, 0x8000) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) [ 191.401211][T10155] R13: 00000000004c7f94 R14: 00000000004de3b0 R15: 0000000000000008 04:45:33 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {}], 0x2, 0x0, 0x0, 0x0) [ 191.442935][T10158] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x7, 0x0, 0x267) [ 191.524103][T10158] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:33 executing program 4 (fault-call:7 fault-nth:10): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 191.815247][T10179] FAULT_INJECTION: forcing a failure. [ 191.815247][T10179] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:45:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 04:45:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 192.023030][T10179] CPU: 1 PID: 10179 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 192.030963][T10179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.041020][T10179] Call Trace: [ 192.044308][T10179] dump_stack+0x1fb/0x318 [ 192.044327][T10179] should_fail+0x555/0x770 [ 192.044344][T10179] should_fail_alloc_page+0x55/0x60 [ 192.044353][T10179] prepare_alloc_pages+0x283/0x460 [ 192.044368][T10179] __alloc_pages_nodemask+0xb2/0x5d0 04:45:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x8, 0x0, 0x267) [ 192.044386][T10179] alloc_pages_current+0x2db/0x500 [ 192.044401][T10179] push_pipe+0x3b1/0x750 [ 192.044423][T10179] __pipe_get_pages+0x8b/0x390 [ 192.044437][T10179] ? __kmalloc_node+0x4d/0x60 [ 192.053160][T10179] iov_iter_get_pages_alloc+0x89b/0xc50 [ 192.053180][T10179] default_file_splice_read+0x10e/0x8d0 [ 192.053199][T10179] ? fsnotify+0x1318/0x13d0 [ 192.053220][T10179] ? security_file_permission+0x23c/0x350 [ 192.053233][T10179] ? rw_verify_area+0x1c2/0x360 [ 192.053242][T10179] ? __ia32_sys_tee+0xb0/0xb0 [ 192.053257][T10179] splice_direct_to_actor+0x39c/0xac0 [ 192.053266][T10179] ? do_splice_direct+0x330/0x330 [ 192.053289][T10179] do_splice_direct+0x200/0x330 [ 192.078183][T10188] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 192.078290][T10179] ? security_file_permission+0xd0/0x350 [ 192.110751][T10188] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. [ 192.113763][T10179] do_sendfile+0x7e4/0xfd0 [ 192.113793][T10179] __x64_sys_sendfile64+0xfc/0x1b0 [ 192.113808][T10179] do_syscall_64+0xf7/0x1c0 [ 192.113822][T10179] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.113831][T10179] RIP: 0033:0x45a219 [ 192.113840][T10179] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.113846][T10179] RSP: 002b:00007f512f662c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 192.113855][T10179] RAX: ffffffffffffffda RBX: 00007f512f662c90 RCX: 000000000045a219 04:45:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 04:45:34 executing program 4 (fault-call:7 fault-nth:11): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 192.113860][T10179] RDX: 0000000020000040 RSI: 0000000000000004 RDI: 0000000000000003 [ 192.113865][T10179] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 192.113870][T10179] R10: 0000000000008001 R11: 0000000000000246 R12: 00007f512f6636d4 [ 192.113876][T10179] R13: 00000000004c7f94 R14: 00000000004de3b0 R15: 0000000000000008 04:45:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x9, 0x0, 0x267) 04:45:34 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {}], 0x2, 0x0, 0x0, 0x0) 04:45:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getpeername$netrom(r4, &(0x7f00000001c0)={{0x3, @default}, [@netrom, @netrom, @rose, @remote, @default, @netrom, @rose, @bcast]}, &(0x7f0000000000)=0x48) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r8, @ANYBLOB="00000000ffffffff0000000008000100686866000c000200080005"], 0x3}}, 0x0) connect$can_j1939(r6, &(0x7f0000000100)={0x1d, r8, 0x3, {0x0, 0x1, 0x3}, 0xfd}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r10, 0x4) [ 192.487821][T10206] FAULT_INJECTION: forcing a failure. [ 192.487821][T10206] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 192.505598][T10206] CPU: 1 PID: 10206 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 192.513511][T10206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.523566][T10206] Call Trace: [ 192.526853][T10206] dump_stack+0x1fb/0x318 [ 192.531177][T10206] should_fail+0x555/0x770 [ 192.535599][T10206] should_fail_alloc_page+0x55/0x60 [ 192.540786][T10206] prepare_alloc_pages+0x283/0x460 [ 192.545889][T10206] __alloc_pages_nodemask+0xb2/0x5d0 [ 192.551172][T10206] alloc_pages_current+0x2db/0x500 [ 192.556282][T10206] push_pipe+0x3b1/0x750 [ 192.560518][T10206] __pipe_get_pages+0x8b/0x390 [ 192.565270][T10206] ? __kmalloc_node+0x4d/0x60 [ 192.569942][T10206] iov_iter_get_pages_alloc+0x89b/0xc50 [ 192.575480][T10206] default_file_splice_read+0x10e/0x8d0 [ 192.581027][T10206] ? fsnotify+0x1318/0x13d0 [ 192.585531][T10206] ? security_file_permission+0x23c/0x350 [ 192.591242][T10206] ? rw_verify_area+0x1c2/0x360 [ 192.596081][T10206] ? __ia32_sys_tee+0xb0/0xb0 [ 192.600745][T10206] splice_direct_to_actor+0x39c/0xac0 [ 192.606101][T10206] ? do_splice_direct+0x330/0x330 [ 192.611122][T10206] do_splice_direct+0x200/0x330 [ 192.615964][T10206] ? security_file_permission+0xd0/0x350 [ 192.621587][T10206] do_sendfile+0x7e4/0xfd0 [ 192.626002][T10206] __x64_sys_sendfile64+0xfc/0x1b0 [ 192.631102][T10206] do_syscall_64+0xf7/0x1c0 [ 192.635597][T10206] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.641476][T10206] RIP: 0033:0x45a219 [ 192.645359][T10206] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.664952][T10206] RSP: 002b:00007f512f641c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 192.673347][T10206] RAX: ffffffffffffffda RBX: 00007f512f641c90 RCX: 000000000045a219 [ 192.681309][T10206] RDX: 0000000020000040 RSI: 0000000000000004 RDI: 0000000000000003 [ 192.689270][T10206] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 192.697226][T10206] R10: 0000000000008001 R11: 0000000000000246 R12: 00007f512f6426d4 [ 192.705355][T10206] R13: 00000000004c7f94 R14: 00000000004de3b0 R15: 0000000000000008 04:45:34 executing program 4 (fault-call:7 fault-nth:12): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 192.801210][T10220] FAULT_INJECTION: forcing a failure. [ 192.801210][T10220] name failslab, interval 1, probability 0, space 0, times 0 [ 192.851728][T10220] CPU: 1 PID: 10220 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 192.859656][T10220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.869708][T10220] Call Trace: [ 192.872982][T10220] dump_stack+0x1fb/0x318 [ 192.877295][T10220] should_fail+0x555/0x770 [ 192.881690][T10220] __should_failslab+0x11a/0x160 [ 192.886607][T10220] ? kmalloc_array+0x2f/0x50 [ 192.891174][T10220] should_failslab+0x9/0x20 [ 192.895656][T10220] __kmalloc+0x7a/0x340 [ 192.899789][T10220] ? __alloc_pages_nodemask+0x2e3/0x5d0 [ 192.905336][T10220] kmalloc_array+0x2f/0x50 [ 192.909734][T10220] rw_copy_check_uvector+0x96/0x360 [ 192.914928][T10220] import_iovec+0x8c/0x2a0 [ 192.919323][T10220] vfs_readv+0x90/0x120 [ 192.923472][T10220] ? __kasan_check_write+0x14/0x20 [ 192.928557][T10220] ? __pipe_get_pages+0x2c0/0x390 [ 192.933562][T10220] ? iov_iter_get_pages_alloc+0x8b2/0xc50 [ 192.939261][T10220] default_file_splice_read+0x544/0x8d0 [ 192.944806][T10220] ? security_file_permission+0x23c/0x350 [ 192.950502][T10220] ? rw_verify_area+0x1c2/0x360 [ 192.955326][T10220] ? __ia32_sys_tee+0xb0/0xb0 [ 192.959984][T10220] splice_direct_to_actor+0x39c/0xac0 [ 192.965329][T10220] ? do_splice_direct+0x330/0x330 [ 192.970353][T10220] do_splice_direct+0x200/0x330 [ 192.975182][T10220] ? security_file_permission+0xd0/0x350 [ 192.980794][T10220] do_sendfile+0x7e4/0xfd0 [ 192.985210][T10220] __x64_sys_sendfile64+0xfc/0x1b0 [ 192.990303][T10220] do_syscall_64+0xf7/0x1c0 [ 192.994787][T10220] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.000657][T10220] RIP: 0033:0x45a219 [ 193.004529][T10220] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.024195][T10220] RSP: 002b:00007f512f662c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 193.032581][T10220] RAX: ffffffffffffffda RBX: 00007f512f662c90 RCX: 000000000045a219 [ 193.040529][T10220] RDX: 0000000020000040 RSI: 0000000000000004 RDI: 0000000000000003 04:45:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390100a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x60000000}, 0x40) 04:45:35 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) ioctl(0xffffffffffffffff, 0x9, &(0x7f0000000040)="fb09da324554c0b73da43c93cd99754aa8fd6d82b17224307846af4505331510d1867153e67d33f898dff721895e16c8b42b6641e7d14a7a1ed8f8db9469ff2d689f3600b7d79a29f7fee15239a76ccdec6c1d8e779a7321314687") bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, r0, 0x3fe, 0x0, 0x1, 0x10, 0x0, 0x180}, 0x70) [ 193.048478][T10220] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 193.056425][T10220] R10: 0000000000008001 R11: 0000000000000246 R12: 00007f512f6636d4 [ 193.064374][T10220] R13: 00000000004c7f94 R14: 00000000004de3b0 R15: 0000000000000008 [ 193.119874][T10226] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 193.152819][T10226] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390100a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x60000000}, 0x40) 04:45:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0xa, 0x0, 0x267) 04:45:35 executing program 4 (fault-call:7 fault-nth:13): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x2, 0x1, 0x48}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) ioctl$USBDEVFS_DROP_PRIVILEGES(r1, 0x4004551e, &(0x7f0000000080)=0x4) 04:45:35 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {}], 0x2, 0x0, 0x0, 0x0) 04:45:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x60000000}, 0x40) [ 193.349630][T10246] FAULT_INJECTION: forcing a failure. [ 193.349630][T10246] name failslab, interval 1, probability 0, space 0, times 0 [ 193.411457][T10246] CPU: 0 PID: 10246 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 193.419390][T10246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.429448][T10246] Call Trace: [ 193.432742][T10246] dump_stack+0x1fb/0x318 [ 193.437081][T10246] should_fail+0x555/0x770 [ 193.441508][T10246] __should_failslab+0x11a/0x160 [ 193.446469][T10246] should_failslab+0x9/0x20 [ 193.446483][T10246] kmem_cache_alloc_trace+0x5d/0x2f0 [ 193.446494][T10246] ? pagemap_read+0x2d5/0x6c0 [ 193.446506][T10246] pagemap_read+0x2d5/0x6c0 [ 193.456262][T10246] ? rw_verify_area+0x1c2/0x360 [ 193.456276][T10246] do_iter_read+0x4b1/0x5b0 [ 193.456303][T10246] vfs_readv+0xc2/0x120 [ 193.456325][T10246] ? iov_iter_get_pages_alloc+0x8b2/0xc50 [ 193.456340][T10246] default_file_splice_read+0x544/0x8d0 [ 193.456371][T10246] ? security_file_permission+0x23c/0x350 [ 193.495850][T10246] ? rw_verify_area+0x1c2/0x360 [ 193.500682][T10246] ? __ia32_sys_tee+0xb0/0xb0 [ 193.505340][T10246] splice_direct_to_actor+0x39c/0xac0 [ 193.510689][T10246] ? do_splice_direct+0x330/0x330 [ 193.515698][T10246] do_splice_direct+0x200/0x330 [ 193.520528][T10246] ? security_file_permission+0xd0/0x350 [ 193.526138][T10246] do_sendfile+0x7e4/0xfd0 [ 193.530538][T10246] __x64_sys_sendfile64+0xfc/0x1b0 [ 193.535628][T10246] do_syscall_64+0xf7/0x1c0 [ 193.540108][T10246] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.545980][T10246] RIP: 0033:0x45a219 [ 193.549850][T10246] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.569432][T10246] RSP: 002b:00007f512f662c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 193.577819][T10246] RAX: ffffffffffffffda RBX: 00007f512f662c90 RCX: 000000000045a219 [ 193.585766][T10246] RDX: 0000000020000040 RSI: 0000000000000004 RDI: 0000000000000003 [ 193.593712][T10246] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 193.601660][T10246] R10: 0000000000008001 R11: 0000000000000246 R12: 00007f512f6636d4 04:45:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0xb, 0x0, 0x267) 04:45:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSETA(r4, 0x5406, &(0x7f0000000100)={0x83, 0x81, 0x8001, 0xfff, 0xd, 0x8, 0x5, 0x62, 0x9, 0x8}) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000000)={0x6}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00a\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xb779ef21efb66f11}) [ 193.609606][T10246] R13: 00000000004c7f94 R14: 00000000004de3b0 R15: 0000000000000008 04:45:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:35 executing program 4 (fault-call:7 fault-nth:14): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 193.723225][T10264] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.730852][T10264] bridge0: port 1(bridge_slave_0) entered disabled state 04:45:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390100a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000500), 0x0, 0x100, 0x60000000}, 0x40) [ 193.842471][T10276] FAULT_INJECTION: forcing a failure. [ 193.842471][T10276] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 193.855708][T10276] CPU: 1 PID: 10276 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 193.863592][T10276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.873640][T10276] Call Trace: [ 193.876928][T10276] dump_stack+0x1fb/0x318 [ 193.881259][T10276] should_fail+0x555/0x770 [ 193.885674][T10276] should_fail_alloc_page+0x55/0x60 [ 193.890863][T10276] prepare_alloc_pages+0x283/0x460 [ 193.895973][T10276] __alloc_pages_nodemask+0xb2/0x5d0 [ 193.901256][T10276] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.907324][T10276] kmem_getpages+0x4d/0xa00 [ 193.911823][T10276] cache_grow_begin+0x7e/0x2c0 [ 193.916589][T10276] cache_alloc_refill+0x311/0x3f0 [ 193.921612][T10276] ? check_preemption_disabled+0xb7/0x2a0 [ 193.927331][T10276] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 193.932694][T10276] ? pagemap_read+0x2d5/0x6c0 [ 193.937364][T10276] pagemap_read+0x2d5/0x6c0 [ 193.941860][T10276] ? rw_verify_area+0x1c2/0x360 [ 193.946703][T10276] do_iter_read+0x4b1/0x5b0 [ 193.951210][T10276] vfs_readv+0xc2/0x120 [ 193.955368][T10276] ? iov_iter_get_pages_alloc+0x8b2/0xc50 [ 193.961080][T10276] default_file_splice_read+0x544/0x8d0 [ 193.966640][T10276] ? security_file_permission+0x23c/0x350 [ 193.972353][T10276] ? rw_verify_area+0x1c2/0x360 [ 193.977191][T10276] ? __ia32_sys_tee+0xb0/0xb0 [ 193.981867][T10276] splice_direct_to_actor+0x39c/0xac0 [ 193.987226][T10276] ? do_splice_direct+0x330/0x330 [ 193.992252][T10276] do_splice_direct+0x200/0x330 [ 193.997093][T10276] ? security_file_permission+0xd0/0x350 [ 194.002717][T10276] do_sendfile+0x7e4/0xfd0 [ 194.007140][T10276] __x64_sys_sendfile64+0xfc/0x1b0 [ 194.012242][T10276] do_syscall_64+0xf7/0x1c0 [ 194.016742][T10276] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.022623][T10276] RIP: 0033:0x45a219 [ 194.026813][T10276] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 194.046404][T10276] RSP: 002b:00007f512f641c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 194.054807][T10276] RAX: ffffffffffffffda RBX: 00007f512f641c90 RCX: 000000000045a219 [ 194.062772][T10276] RDX: 0000000020000040 RSI: 0000000000000004 RDI: 0000000000000003 [ 194.070729][T10276] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 194.078687][T10276] R10: 0000000000008001 R11: 0000000000000246 R12: 00007f512f6426d4 [ 194.086644][T10276] R13: 00000000004c7f94 R14: 00000000004de3b0 R15: 0000000000000008 04:45:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000500), 0x0, 0x100, 0x60000000}, 0x40) 04:45:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0xc, 0x0, 0x267) 04:45:36 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r2}], 0x1, 0x0, 0x0, 0x0) 04:45:36 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r2}], 0x1, 0x0, 0x0, 0x0) 04:45:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000500), 0x0, 0x100, 0x60000000}, 0x40) 04:45:36 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r2}], 0x1, 0x0, 0x0, 0x0) 04:45:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x21, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0", 0x0, 0x100, 0x60000000}, 0x40) [ 194.435131][T10271] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.442280][T10271] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.449721][T10271] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.456844][T10271] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.477583][T10271] device bridge0 entered promiscuous mode 04:45:36 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{}, {r2}], 0x2, 0x0, 0x0, 0x0) [ 194.685058][T10270] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 194.700558][T10270] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. [ 194.887437][T10311] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.894645][T10311] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.901960][T10311] device bridge0 left promiscuous mode 04:45:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSETA(r4, 0x5406, &(0x7f0000000100)={0x83, 0x81, 0x8001, 0xfff, 0xd, 0x8, 0x5, 0x62, 0x9, 0x8}) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000000)={0x6}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00a\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xb779ef21efb66f11}) 04:45:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x21, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0", 0x0, 0x100, 0x60000000}, 0x40) 04:45:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0xd, 0x0, 0x267) 04:45:36 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:36 executing program 4 (fault-call:7 fault-nth:15): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 194.963545][T10310] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.970699][T10310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.978104][T10310] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.985223][T10310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.993286][T10310] device bridge0 entered promiscuous mode [ 195.041159][T10318] FAULT_INJECTION: forcing a failure. [ 195.041159][T10318] name failslab, interval 1, probability 0, space 0, times 0 [ 195.055840][T10318] CPU: 0 PID: 10318 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 195.063741][T10318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.073785][T10318] Call Trace: [ 195.077063][T10318] dump_stack+0x1fb/0x318 [ 195.081372][T10318] should_fail+0x555/0x770 [ 195.085773][T10318] __should_failslab+0x11a/0x160 [ 195.090689][T10318] should_failslab+0x9/0x20 [ 195.095170][T10318] kmem_cache_alloc_trace+0x5d/0x2f0 [ 195.100433][T10318] ? pagemap_read+0x2d5/0x6c0 [ 195.105091][T10318] pagemap_read+0x2d5/0x6c0 [ 195.109569][T10318] ? iov_iter_advance+0x732/0xf90 [ 195.114574][T10318] do_iter_read+0x4b1/0x5b0 [ 195.119072][T10318] vfs_readv+0xc2/0x120 [ 195.123214][T10318] ? iov_iter_get_pages_alloc+0x8b2/0xc50 [ 195.128911][T10318] default_file_splice_read+0x544/0x8d0 [ 195.134447][T10318] ? security_file_permission+0x23c/0x350 [ 195.140142][T10318] ? rw_verify_area+0x1c2/0x360 [ 195.144983][T10318] ? __ia32_sys_tee+0xb0/0xb0 [ 195.149636][T10318] splice_direct_to_actor+0x39c/0xac0 [ 195.154980][T10318] ? do_splice_direct+0x330/0x330 [ 195.159987][T10318] do_splice_direct+0x200/0x330 [ 195.164817][T10318] ? security_file_permission+0xd0/0x350 [ 195.170423][T10318] do_sendfile+0x7e4/0xfd0 [ 195.174823][T10318] __x64_sys_sendfile64+0xfc/0x1b0 [ 195.179924][T10318] do_syscall_64+0xf7/0x1c0 [ 195.184405][T10318] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.190272][T10318] RIP: 0033:0x45a219 [ 195.194145][T10318] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 195.213728][T10318] RSP: 002b:00007f512f662c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 195.222114][T10318] RAX: ffffffffffffffda RBX: 00007f512f662c90 RCX: 000000000045a219 [ 195.230061][T10318] RDX: 0000000020000040 RSI: 0000000000000004 RDI: 0000000000000003 [ 195.238006][T10318] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 195.245953][T10318] R10: 0000000000008001 R11: 0000000000000246 R12: 00007f512f6636d4 [ 195.253901][T10318] R13: 00000000004c7f94 R14: 00000000004de3b0 R15: 0000000000000008 [ 195.271128][T10319] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:37 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:37 executing program 4 (fault-call:7 fault-nth:16): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 195.303001][T10319] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSETA(r4, 0x5406, &(0x7f0000000100)={0x83, 0x81, 0x8001, 0xfff, 0xd, 0x8, 0x5, 0x62, 0x9, 0x8}) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000000)={0x6}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00a\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xb779ef21efb66f11}) [ 195.434490][T10337] FAULT_INJECTION: forcing a failure. [ 195.434490][T10337] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 195.447728][T10337] CPU: 0 PID: 10337 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 195.455621][T10337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.465685][T10337] Call Trace: [ 195.468980][T10337] dump_stack+0x1fb/0x318 [ 195.473313][T10337] should_fail+0x555/0x770 [ 195.477735][T10337] should_fail_alloc_page+0x55/0x60 [ 195.482927][T10337] prepare_alloc_pages+0x283/0x460 [ 195.482942][T10337] __alloc_pages_nodemask+0xb2/0x5d0 [ 195.482961][T10337] kmem_getpages+0x4d/0xa00 [ 195.482974][T10337] cache_grow_begin+0x7e/0x2c0 [ 195.482986][T10337] cache_alloc_refill+0x311/0x3f0 [ 195.482998][T10337] ? check_preemption_disabled+0xb7/0x2a0 [ 195.483012][T10337] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 195.518677][T10337] ? pagemap_read+0x2d5/0x6c0 [ 195.523344][T10337] pagemap_read+0x2d5/0x6c0 [ 195.527825][T10337] ? iov_iter_advance+0x732/0xf90 [ 195.532835][T10337] do_iter_read+0x4b1/0x5b0 [ 195.537321][T10337] vfs_readv+0xc2/0x120 [ 195.541468][T10337] ? iov_iter_get_pages_alloc+0x8b2/0xc50 [ 195.547171][T10337] default_file_splice_read+0x544/0x8d0 [ 195.552717][T10337] ? security_file_permission+0x23c/0x350 [ 195.558416][T10337] ? rw_verify_area+0x1c2/0x360 [ 195.563240][T10337] ? __ia32_sys_tee+0xb0/0xb0 [ 195.567916][T10337] splice_direct_to_actor+0x39c/0xac0 [ 195.573261][T10337] ? do_splice_direct+0x330/0x330 [ 195.578269][T10337] do_splice_direct+0x200/0x330 [ 195.583100][T10337] ? security_file_permission+0xd0/0x350 [ 195.588708][T10337] do_sendfile+0x7e4/0xfd0 [ 195.593112][T10337] __x64_sys_sendfile64+0xfc/0x1b0 [ 195.598203][T10337] do_syscall_64+0xf7/0x1c0 [ 195.602689][T10337] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.608562][T10337] RIP: 0033:0x45a219 [ 195.612444][T10337] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:45:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0xe, 0x0, 0x267) 04:45:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x21, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0", 0x0, 0x100, 0x60000000}, 0x40) [ 195.632025][T10337] RSP: 002b:00007f512f641c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 195.640409][T10337] RAX: ffffffffffffffda RBX: 00007f512f641c90 RCX: 000000000045a219 [ 195.648379][T10337] RDX: 0000000020000040 RSI: 0000000000000004 RDI: 0000000000000003 [ 195.656338][T10337] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 195.664286][T10337] R10: 0000000000008001 R11: 0000000000000246 R12: 00007f512f6426d4 [ 195.672245][T10337] R13: 00000000004c7f94 R14: 00000000004de3b0 R15: 0000000000000008 [ 195.727607][T10346] device bridge0 entered promiscuous mode [ 195.755256][T10336] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.762537][T10336] bridge0: port 1(bridge_slave_0) entered disabled state 04:45:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x32, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2", 0x0, 0x100, 0x60000000}, 0x40) [ 195.772967][T10336] device bridge0 left promiscuous mode [ 196.045180][T10342] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.052578][T10342] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.060212][T10342] device bridge0 left promiscuous mode [ 196.140489][T10347] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.147627][T10347] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.155040][T10347] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.162124][T10347] bridge0: port 1(bridge_slave_0) entered forwarding state 04:45:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x21, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0", 0x0, 0x100, 0x60000000}, 0x40) 04:45:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:38 executing program 4 (fault-call:7 fault-nth:17): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x10, 0x0, 0x267) 04:45:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x32, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2", 0x0, 0x100, 0x60000000}, 0x40) [ 196.202974][T10347] device bridge0 entered promiscuous mode [ 196.271487][T10365] FAULT_INJECTION: forcing a failure. [ 196.271487][T10365] name failslab, interval 1, probability 0, space 0, times 0 [ 196.291543][T10367] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 196.293210][T10365] CPU: 1 PID: 10365 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 196.307656][T10365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.317714][T10365] Call Trace: 04:45:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x32, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2", 0x0, 0x100, 0x60000000}, 0x40) [ 196.321011][T10365] dump_stack+0x1fb/0x318 [ 196.324034][T10367] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. [ 196.325344][T10365] should_fail+0x555/0x770 [ 196.325362][T10365] __should_failslab+0x11a/0x160 [ 196.325384][T10365] should_failslab+0x9/0x20 [ 196.339142][T10365] kmem_cache_alloc_trace+0x5d/0x2f0 [ 196.353806][T10365] ? pagemap_read+0x2d5/0x6c0 [ 196.358504][T10365] pagemap_read+0x2d5/0x6c0 [ 196.358525][T10365] ? iov_iter_advance+0x732/0xf90 [ 196.368116][T10365] do_iter_read+0x4b1/0x5b0 [ 196.372635][T10365] vfs_readv+0xc2/0x120 [ 196.376810][T10365] ? iov_iter_get_pages_alloc+0x8b2/0xc50 [ 196.382533][T10365] default_file_splice_read+0x544/0x8d0 [ 196.388119][T10365] ? security_file_permission+0x23c/0x350 [ 196.393840][T10365] ? rw_verify_area+0x1c2/0x360 [ 196.398681][T10365] ? __ia32_sys_tee+0xb0/0xb0 [ 196.403356][T10365] splice_direct_to_actor+0x39c/0xac0 [ 196.408718][T10365] ? do_splice_direct+0x330/0x330 [ 196.413745][T10365] do_splice_direct+0x200/0x330 [ 196.418587][T10365] ? security_file_permission+0xd0/0x350 [ 196.424209][T10365] do_sendfile+0x7e4/0xfd0 [ 196.428629][T10365] __x64_sys_sendfile64+0xfc/0x1b0 [ 196.433735][T10365] do_syscall_64+0xf7/0x1c0 [ 196.438228][T10365] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.444110][T10365] RIP: 0033:0x45a219 [ 196.447994][T10365] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 196.467586][T10365] RSP: 002b:00007f512f662c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 196.476119][T10365] RAX: ffffffffffffffda RBX: 00007f512f662c90 RCX: 000000000045a219 [ 196.484194][T10365] RDX: 0000000020000040 RSI: 0000000000000004 RDI: 0000000000000003 [ 196.492160][T10365] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 196.500121][T10365] R10: 0000000000008001 R11: 0000000000000246 R12: 00007f512f6636d4 [ 196.508092][T10365] R13: 00000000004c7f94 R14: 00000000004de3b0 R15: 0000000000000008 04:45:38 executing program 4 (fault-call:7 fault-nth:18): r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3a, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a3901010803", 0x0, 0x100, 0x60000000}, 0x40) 04:45:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000500), 0x0, 0x100, 0x60000000}, 0x40) 04:45:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x11, 0x0, 0x267) 04:45:38 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSETA(r4, 0x5406, &(0x7f0000000100)={0x83, 0x81, 0x8001, 0xfff, 0xd, 0x8, 0x5, 0x62, 0x9, 0x8}) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000000)={0x6}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00a\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xb779ef21efb66f11}) 04:45:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390100a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3a, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a3901010803", 0x0, 0x100, 0x60000000}, 0x40) 04:45:38 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100002, 0x8001) 04:45:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3a, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a3901010803", 0x0, 0x100, 0x60000000}, 0x40) [ 196.864689][T10397] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 196.884030][T10397] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000500), 0x0, 0x100, 0x60000000}, 0x40) 04:45:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3a, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a3901010803", 0x0, 0x100, 0x60000000}, 0x40) [ 197.064555][T10402] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.071793][T10402] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.079207][T10402] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.086329][T10402] bridge0: port 1(bridge_slave_0) entered forwarding state 04:45:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x12, 0x0, 0x267) [ 197.118045][T10402] device bridge0 entered promiscuous mode [ 197.152185][ T2846] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 04:45:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3e, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da19244", 0x0, 0x100, 0x60000000}, 0x40) 04:45:39 executing program 2 (fault-call:8 fault-nth:0): mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:39 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100003, 0x8001) 04:45:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3e, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da19244", 0x0, 0x100, 0x60000000}, 0x40) 04:45:39 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100004, 0x8001) 04:45:39 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x25, 0x0, 0x267) [ 197.399852][T10434] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 197.417352][T10434] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3e, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da19244", 0x0, 0x100, 0x60000000}, 0x40) 04:45:39 executing program 1: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB], 0xb) close(r0) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_gettime(r1, &(0x7f0000000040)) 04:45:39 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3e, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da19244", 0x0, 0x100, 0x60000000}, 0x40) 04:45:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x40, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da192442518", 0x0, 0x100, 0x60000000}, 0x40) 04:45:39 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100005, 0x8001) 04:45:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x5c, 0x0, 0x267) 04:45:39 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1, 0x3}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:39 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473786cd89e9b08e3f5972fe9ca162b123e19268c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7472616e733d66642c7208006cae41ef1d7eba7d862a45f55e7b853d4274417e72a6a7d47b8b6f3d8167aebb526bb5e58e7ee6bc92126a4426e1d9c2f12dc31a203f915f6a713226918ef7cdf6b4bb76c7420f69178cd10101749049440f3d396343b7971335159fbbc9c9499a1d27", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',\x00']) r3 = creat(&(0x7f0000139000)='./file0/bus\x00', 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000001c0)=0xfffffffd, 0x4) getsockopt$inet6_mreq(r3, 0x29, 0x15, &(0x7f0000000080)={@mcast2}, &(0x7f0000000180)=0x14) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x2000, 0x0) setsockopt$packet_int(r4, 0x107, 0x3, &(0x7f0000000340)=0x5, 0x4) r5 = socket(0x10, 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) 04:45:39 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100006, 0x8001) 04:45:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x40, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da192442518", 0x0, 0x100, 0x60000000}, 0x40) [ 197.904358][T10485] 9pnet: Insufficient options for proto=fd [ 197.945251][T10491] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 197.981534][T10491] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:40 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1, 0x8}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x40, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da192442518", 0x0, 0x100, 0x60000000}, 0x40) [ 198.009813][T10495] 9pnet: Insufficient options for proto=fd 04:45:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000016c0)='TIPCv2\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000001800)={&(0x7f0000000000)=ANY=[@ANYBLOB="023c640000000000", @ANYRES16=r1, @ANYBLOB="8d02000000000000000008000000180004001400010062726f67be9df373742d6c696e6b0000"], 0x2c}}, 0x0) 04:45:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x1fc, 0x0, 0x267) 04:45:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x41, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181a", 0x0, 0x100, 0x60000000}, 0x40) 04:45:40 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1, 0x300}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:40 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100007, 0x8001) 04:45:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000240)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_S_INPUT(r5, 0xc0045627, &(0x7f0000000140)=0x3) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f0000000040)={0x320000, 0x10001, 0x1, [], &(0x7f0000000000)={0x9909dd, 0x1, [], @ptr=0x400}}) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='smaps\x00') connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, 0x1c) sendfile(r1, r6, 0x0, 0x88001) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='ns\x00') getsockopt$inet_sctp_SCTP_MAXSEG(r7, 0x84, 0xd, 0x0, 0x0) 04:45:40 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100008, 0x8001) 04:45:40 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1, 0x4000}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x41, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181a", 0x0, 0x100, 0x60000000}, 0x40) 04:45:40 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100010, 0x8001) [ 198.458232][T10541] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 198.492057][T10541] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x1fd, 0x0, 0x267) 04:45:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000080)='rxrpc_s\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:45:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x41, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181a", 0x0, 0x100, 0x60000000}, 0x40) 04:45:40 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:40 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x1001a0, 0x8001) 04:45:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x0, 0x60000000}, 0x40) 04:45:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x300, 0x0, 0x267) 04:45:40 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1, 0x0, 0x3}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:40 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100300, 0x8001) [ 198.936211][T10582] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x0, 0x60000000}, 0x40) 04:45:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000080)='rxrpc_s\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 198.976998][T10582] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x0, 0x60000000}, 0x40) 04:45:41 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1, 0x0, 0x8}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x500, 0x0, 0x267) 04:45:41 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100500, 0x8001) 04:45:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0x0, 0x0}, 0x40) 04:45:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:41 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1, 0x0, 0x300}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:41 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100600, 0x8001) [ 199.430405][T10620] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0x0, 0x0}, 0x40) 04:45:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x0, 0x60000000}, 0x40) [ 199.489889][T10620] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0x0, 0x0}, 0x40) 04:45:41 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1, 0x0, 0x4000}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x600, 0x0, 0x267) 04:45:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000140)={r4, &(0x7f00000000c0)=""/9}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) write$binfmt_misc(r6, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) r8 = socket$inet(0x2, 0x3, 0x29) bind$inet(r8, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) splice(r5, 0x0, r7, 0x0, 0x10005, 0x0) 04:45:41 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100700, 0x8001) 04:45:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 04:45:41 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:41 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x104000, 0x8001) 04:45:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390100a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 04:45:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=""/236, 0x4c, 0xec, 0x1}, 0x20) 04:45:41 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2, 0x3}], 0x2, 0x0, 0x0, 0x0) 04:45:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x700, 0x0, 0x267) [ 199.991492][T10670] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) [ 200.096034][T10670] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:42 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2, 0x8}], 0x2, 0x0, 0x0, 0x0) 04:45:42 executing program 1: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000880)=[{0x0, 0x0, 0x101}, {&(0x7f0000000740)="6dde2ede9b83004f7662e7595a658ca58252b0c6e455a7c1f71f", 0x1a, 0x87}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000000180), r4, 0x2}}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$CAN_RAW_FD_FRAMES(r6, 0x65, 0x5, &(0x7f0000000100), 0x4) 04:45:42 executing program 5 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:42 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x10a001, 0x8001) 04:45:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x900, 0x0, 0x267) [ 200.348038][T10697] XFS (loop1): Invalid superblock magic number 04:45:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:42 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2, 0x300}], 0x2, 0x0, 0x0, 0x0) [ 200.435844][T10711] FAULT_INJECTION: forcing a failure. [ 200.435844][T10711] name failslab, interval 1, probability 0, space 0, times 0 [ 200.479895][T10711] CPU: 1 PID: 10711 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 200.487836][T10711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.497905][T10711] Call Trace: [ 200.501207][T10711] dump_stack+0x1fb/0x318 [ 200.505539][T10711] should_fail+0x555/0x770 [ 200.509960][T10711] __should_failslab+0x11a/0x160 [ 200.514896][T10711] ? kzalloc+0x1f/0x40 [ 200.518954][T10711] should_failslab+0x9/0x20 [ 200.523448][T10711] __kmalloc+0x7a/0x340 [ 200.527590][T10711] ? rcu_lock_release+0x26/0x30 [ 200.532477][T10711] kzalloc+0x1f/0x40 [ 200.536355][T10711] bpf_prog_test_run_skb+0xf9/0x1030 [ 200.541633][T10711] ? __kasan_check_write+0x14/0x20 [ 200.546727][T10711] ? fput_many+0x47/0x1a0 [ 200.551040][T10711] ? fput+0x1a/0x20 [ 200.554834][T10711] ? __bpf_prog_get+0x2a3/0x320 [ 200.559668][T10711] ? __bpf_trace_bpf_test_finish+0x30/0x30 [ 200.565469][T10711] __do_sys_bpf+0x2981/0xbcb0 [ 200.570305][T10711] ? __kasan_check_write+0x14/0x20 [ 200.575418][T10711] ? refcount_sub_and_test_checked+0x179/0x230 [ 200.581575][T10711] ? vfs_write+0x4a2/0x590 [ 200.585984][T10711] ? __f_unlock_pos+0x19/0x20 [ 200.590659][T10711] ? check_preemption_disabled+0xb7/0x2a0 [ 200.596395][T10711] ? debug_smp_processor_id+0x1c/0x20 [ 200.601754][T10711] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 200.607808][T10711] ? prepare_exit_to_usermode+0x1f7/0x580 [ 200.613513][T10711] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 200.619219][T10711] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 200.624662][T10711] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 200.630364][T10711] ? do_syscall_64+0x1d/0x1c0 [ 200.635091][T10711] __x64_sys_bpf+0x7a/0x90 [ 200.639497][T10711] do_syscall_64+0xf7/0x1c0 [ 200.643990][T10711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.649869][T10711] RIP: 0033:0x45a219 [ 200.653750][T10711] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:45:42 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x800000, 0x8001) [ 200.673429][T10711] RSP: 002b:00007f7090fcec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 200.681824][T10711] RAX: ffffffffffffffda RBX: 00007f7090fcec90 RCX: 000000000045a219 [ 200.689780][T10711] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 200.697744][T10711] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 200.705706][T10711] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7090fcf6d4 [ 200.713663][T10711] R13: 00000000004c07b2 R14: 00000000004d2fc8 R15: 0000000000000005 04:45:42 executing program 5 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:42 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2, 0x4000}], 0x2, 0x0, 0x0, 0x0) 04:45:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0xa00, 0x0, 0x267) [ 200.793220][T10728] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 200.821056][T10728] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. [ 200.956880][T10742] FAULT_INJECTION: forcing a failure. [ 200.956880][T10742] name failslab, interval 1, probability 0, space 0, times 0 [ 201.017541][T10742] CPU: 0 PID: 10742 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 201.025482][T10742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.035543][T10742] Call Trace: [ 201.038835][T10742] dump_stack+0x1fb/0x318 [ 201.043176][T10742] should_fail+0x555/0x770 [ 201.047607][T10742] __should_failslab+0x11a/0x160 [ 201.052708][T10742] should_failslab+0x9/0x20 [ 201.052721][T10742] kmem_cache_alloc_trace+0x5d/0x2f0 [ 201.052732][T10742] ? bpf_prog_test_run_skb+0x28e/0x1030 [ 201.052744][T10742] ? bpf_ctx_init+0x14b/0x190 [ 201.062524][T10742] bpf_prog_test_run_skb+0x28e/0x1030 [ 201.062536][T10742] ? __bpf_trace_bpf_test_finish+0x30/0x30 [ 201.062547][T10742] ? fput_many+0x3e/0x1a0 [ 201.062558][T10742] ? __bpf_trace_bpf_test_finish+0x30/0x30 [ 201.062571][T10742] __do_sys_bpf+0x2981/0xbcb0 [ 201.098796][T10742] ? __kasan_check_write+0x14/0x20 [ 201.103902][T10742] ? refcount_sub_and_test_checked+0x179/0x230 [ 201.110090][T10742] ? vfs_write+0x4a2/0x590 [ 201.114492][T10742] ? __f_unlock_pos+0x19/0x20 [ 201.119164][T10742] ? retint_kernel+0x2b/0x2b [ 201.123739][T10742] ? trace_hardirqs_on_caller+0x74/0x80 [ 201.129270][T10742] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 201.134713][T10742] ? check_preemption_disabled+0xa9/0x2a0 [ 201.140424][T10742] ? retint_kernel+0x2b/0x2b [ 201.145005][T10742] __x64_sys_bpf+0x7a/0x90 [ 201.149451][T10742] do_syscall_64+0xf7/0x1c0 [ 201.153942][T10742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.159823][T10742] RIP: 0033:0x45a219 [ 201.163707][T10742] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 201.183296][T10742] RSP: 002b:00007f7090fcec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 201.191691][T10742] RAX: ffffffffffffffda RBX: 00007f7090fcec90 RCX: 000000000045a219 [ 201.199839][T10742] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 201.207936][T10742] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:45:43 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:43 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x80ff7f, 0x8001) [ 201.215899][T10742] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7090fcf6d4 [ 201.223863][T10742] R13: 00000000004c07b2 R14: 00000000004d2fc8 R15: 0000000000000005 04:45:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:43 executing program 1: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000140)=""/23, 0x236) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f00000000c0)={0x2, 0x35315258, 0x3, @stepwise={0x10001, 0x10000, 0x0, 0x4, 0x800, 0x5f3}}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) 04:45:43 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x90ff7f, 0x8001) 04:45:43 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2, 0x0, 0x3}], 0x2, 0x0, 0x0, 0x0) 04:45:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0xb00, 0x0, 0x267) [ 201.429691][T10768] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 201.469783][T10768] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:43 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2, 0x0, 0x8}], 0x2, 0x0, 0x0, 0x0) 04:45:43 executing program 5 (fault-call:2 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 201.563948][T10765] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 201.630810][T10765] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 201.647094][T10765] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 201.662217][T10788] FAULT_INJECTION: forcing a failure. [ 201.662217][T10788] name failslab, interval 1, probability 0, space 0, times 0 [ 201.684960][T10788] CPU: 1 PID: 10788 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 201.692979][T10788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.703072][T10788] Call Trace: [ 201.703092][T10788] dump_stack+0x1fb/0x318 [ 201.703110][T10788] should_fail+0x555/0x770 [ 201.703127][T10788] __should_failslab+0x11a/0x160 [ 201.703137][T10788] ? build_skb+0x29/0x450 [ 201.703148][T10788] should_failslab+0x9/0x20 [ 201.703159][T10788] kmem_cache_alloc+0x56/0x2e0 04:45:43 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0xa0ff7f, 0x8001) 04:45:43 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2, 0x0, 0x300}], 0x2, 0x0, 0x0, 0x0) [ 201.703171][T10788] build_skb+0x29/0x450 [ 201.703184][T10788] bpf_prog_test_run_skb+0x35e/0x1030 [ 201.703206][T10788] ? __bpf_prog_get+0x2a3/0x320 [ 201.703217][T10788] ? __bpf_trace_bpf_test_finish+0x30/0x30 [ 201.703228][T10788] __do_sys_bpf+0x2981/0xbcb0 [ 201.703239][T10788] ? __kasan_check_write+0x14/0x20 [ 201.703250][T10788] ? refcount_sub_and_test_checked+0x179/0x230 [ 201.703262][T10788] ? vfs_write+0x4a2/0x590 [ 201.703276][T10788] ? __f_unlock_pos+0x19/0x20 04:45:43 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0xb0ff7f, 0x8001) [ 201.706706][T10765] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated [ 201.710906][T10788] ? check_preemption_disabled+0xb7/0x2a0 [ 201.710924][T10788] ? debug_smp_processor_id+0x1c/0x20 [ 201.732259][T10765] EXT4-fs (loop1): get root inode failed [ 201.733958][T10788] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 201.733972][T10788] ? prepare_exit_to_usermode+0x1f7/0x580 [ 201.733982][T10788] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 201.733991][T10788] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 201.734000][T10788] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 201.734010][T10788] ? do_syscall_64+0x1d/0x1c0 [ 201.734023][T10788] __x64_sys_bpf+0x7a/0x90 [ 201.734034][T10788] do_syscall_64+0xf7/0x1c0 [ 201.734047][T10788] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.734056][T10788] RIP: 0033:0x45a219 [ 201.734066][T10788] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:45:43 executing program 5 (fault-call:2 fault-nth:3): perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390100a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0xc00, 0x0, 0x267) [ 201.734071][T10788] RSP: 002b:00007f7090fcec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 201.734081][T10788] RAX: ffffffffffffffda RBX: 00007f7090fcec90 RCX: 000000000045a219 [ 201.734086][T10788] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 201.734091][T10788] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 201.734097][T10788] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7090fcf6d4 [ 201.734102][T10788] R13: 00000000004c07b2 R14: 00000000004d2fc8 R15: 0000000000000005 [ 201.743795][T10765] EXT4-fs (loop1): mount failed [ 202.004171][T10804] FAULT_INJECTION: forcing a failure. [ 202.004171][T10804] name failslab, interval 1, probability 0, space 0, times 0 [ 202.017129][T10804] CPU: 1 PID: 10804 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 202.025027][T10804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.035212][T10804] Call Trace: [ 202.038501][T10804] dump_stack+0x1fb/0x318 [ 202.042825][T10804] should_fail+0x555/0x770 [ 202.047236][T10804] __should_failslab+0x11a/0x160 [ 202.052162][T10804] ? skb_clone+0x1cc/0x380 [ 202.056568][T10804] should_failslab+0x9/0x20 [ 202.061058][T10804] kmem_cache_alloc+0x56/0x2e0 [ 202.065804][T10804] ? __kasan_check_read+0x11/0x20 [ 202.070817][T10804] skb_clone+0x1cc/0x380 [ 202.075056][T10804] bpf_clone_redirect+0xa6/0x390 [ 202.080069][T10804] ? __lock_acquire+0xc75/0x1be0 [ 202.084997][T10804] bpf_prog_bebbfe2050753572+0x1dd/0x1000 [ 202.092011][T10804] ? ktime_get+0x4a/0x110 [ 202.096335][T10804] ? ktime_get+0x4a/0x110 [ 202.100654][T10804] ? read_seqcount_begin+0x12a/0x1c0 [ 202.105928][T10804] ? trace_hardirqs_on+0x74/0x80 [ 202.110847][T10804] ? ktime_get+0x4a/0x110 [ 202.115160][T10804] ? read_seqcount_begin+0x17f/0x1c0 [ 202.120432][T10804] ? ktime_get+0xe0/0x110 [ 202.124750][T10804] bpf_test_run+0x2a3/0x770 [ 202.129244][T10804] bpf_prog_test_run_skb+0x798/0x1030 [ 202.134669][T10804] ? __bpf_prog_get+0x2a3/0x320 [ 202.139506][T10804] ? __bpf_trace_bpf_test_finish+0x30/0x30 [ 202.145383][T10804] __do_sys_bpf+0x2981/0xbcb0 [ 202.150046][T10804] ? __kasan_check_write+0x14/0x20 [ 202.155144][T10804] ? refcount_sub_and_test_checked+0x179/0x230 [ 202.161290][T10804] ? vfs_write+0x4a2/0x590 [ 202.165692][T10804] ? __f_unlock_pos+0x19/0x20 [ 202.170366][T10804] ? check_preemption_disabled+0xb7/0x2a0 [ 202.176071][T10804] ? debug_smp_processor_id+0x1c/0x20 [ 202.181432][T10804] ? fpregs_assert_state_consistent+0xb7/0xe0 [ 202.187489][T10804] ? prepare_exit_to_usermode+0x1f7/0x580 [ 202.193194][T10804] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 202.198897][T10804] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 202.204340][T10804] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 202.210046][T10804] ? do_syscall_64+0x1d/0x1c0 [ 202.214709][T10804] __x64_sys_bpf+0x7a/0x90 [ 202.219112][T10804] do_syscall_64+0xf7/0x1c0 [ 202.223603][T10804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.229480][T10804] RIP: 0033:0x45a219 [ 202.233379][T10804] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:45:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 202.252968][T10804] RSP: 002b:00007f7090fcec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 202.261363][T10804] RAX: ffffffffffffffda RBX: 00007f7090fcec90 RCX: 000000000045a219 [ 202.269463][T10804] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 202.277560][T10804] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 202.288223][T10804] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7090fcf6d4 [ 202.296275][T10804] R13: 00000000004c07b2 R14: 00000000004d2fc8 R15: 0000000000000005 04:45:44 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0xc0ff7f, 0x8001) 04:45:44 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2, 0x0, 0x4000}], 0x2, 0x0, 0x0, 0x0) 04:45:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) shutdown(r6, 0x0) r7 = gettid() sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_NET_NS_PID={0x8, 0x13, r7}, @IFLA_PORT_SELF={0x68, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_PROFILE={0x14, 0x2, 'cgroupselinux\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x90}}, 0x0) sched_setparam(r7, &(0x7f0000000000)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r2}, @IFLA_GRE_FWMARK={0x8, 0x3, 0x10}]]}}}]}, 0x48}}, 0x0) [ 202.405246][T10809] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:44 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0xd0ff7f, 0x8001) [ 202.488372][T10809] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0xd00, 0x0, 0x267) 04:45:44 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x1e, 0x0, 0x0, 0x0) [ 202.733095][T10813] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 202.747137][T10813] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 202.779122][T10813] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. 04:45:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0xe00, 0x0, 0x267) [ 202.820853][T10822] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:45:44 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x3) [ 202.894667][T10822] batman_adv: Cannot find parent device 04:45:44 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0xe0ff7f, 0x8001) [ 202.934772][T10813] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. 04:45:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) shutdown(r6, 0x0) r7 = gettid() sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_NET_NS_PID={0x8, 0x13, r7}, @IFLA_PORT_SELF={0x68, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_PROFILE={0x14, 0x2, 'cgroupselinux\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x90}}, 0x0) sched_setparam(r7, &(0x7f0000000000)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r2}, @IFLA_GRE_FWMARK={0x8, 0x3, 0x10}]]}}}]}, 0x48}}, 0x0) 04:45:45 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0xf0ff7f, 0x8001) 04:45:45 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x8) 04:45:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x1100, 0x0, 0x267) [ 203.130549][T10862] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:45 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x300) [ 203.315664][T10864] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 203.382124][T10876] batman_adv: Cannot find parent device 04:45:45 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x1100000, 0x8001) 04:45:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x1200, 0x0, 0x267) 04:45:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:45 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x4000) 04:45:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) shutdown(r6, 0x0) r7 = gettid() sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_NET_NS_PID={0x8, 0x13, r7}, @IFLA_PORT_SELF={0x68, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_PROFILE={0x14, 0x2, 'cgroupselinux\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x90}}, 0x0) sched_setparam(r7, &(0x7f0000000000)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r2}, @IFLA_GRE_FWMARK={0x8, 0x3, 0x10}]]}}}]}, 0x48}}, 0x0) [ 203.587510][T10904] validate_nla: 6 callbacks suppressed [ 203.587516][T10904] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:45 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x1200000, 0x8001) [ 203.631856][T10904] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:45 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x400000) 04:45:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x2000, 0x0, 0x267) 04:45:45 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x1000000) [ 203.813790][T10913] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 203.822169][T10913] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 203.873134][T10913] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 203.907503][T10919] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:45:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 203.954187][T10919] batman_adv: Cannot find parent device 04:45:46 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x3000000) 04:45:46 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x1300000, 0x8001) [ 204.080198][T10947] netlink: 'syz-executor.0': attribute type 9 has an invalid length. 04:45:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) shutdown(r6, 0x0) r7 = gettid() sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_NET_NS_PID={0x8, 0x13, r7}, @IFLA_PORT_SELF={0x68, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_PROFILE={0x14, 0x2, 'cgroupselinux\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x90}}, 0x0) sched_setparam(r7, &(0x7f0000000000)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=@newlink={0x48, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r2}, @IFLA_GRE_FWMARK={0x8, 0x3, 0x10}]]}}}]}, 0x48}}, 0x0) [ 204.127790][T10947] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x2500, 0x0, 0x267) 04:45:46 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x8000000) 04:45:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 204.335446][T10961] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 204.351931][T10961] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 204.362102][T10961] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. 04:45:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:46 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x40000000000000) [ 204.420007][T10969] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 04:45:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 204.467375][T10969] batman_adv: Cannot find parent device 04:45:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x3f00, 0x0, 0x267) 04:45:46 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x1400000, 0x8001) 04:45:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:46 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x100000000000000) [ 204.555632][T10990] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 204.631337][T10990] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:46 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) shutdown(r4, 0x0) r5 = gettid() sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_PID={0x8, 0x13, r5}, @IFLA_PORT_SELF={0x68, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_PROFILE={0x14, 0x2, 'cgroupselinux\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x90}}, 0x0) sched_setparam(r5, &(0x7f0000000000)) 04:45:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x4000, 0x0, 0x267) 04:45:46 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x300000000000000) [ 204.794364][T11011] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 204.813412][T11011] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. 04:45:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390100a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:46 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x1500000, 0x8001) 04:45:46 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) shutdown(r4, 0x0) r5 = gettid() sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_PID={0x8, 0x13, r5}, @IFLA_PORT_SELF={0x68, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_PROFILE={0x14, 0x2, 'cgroupselinux\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x90}}, 0x0) 04:45:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:46 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x800000000000000) 04:45:47 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x1600000, 0x8001) 04:45:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x5c00, 0x0, 0x267) [ 205.042480][T11036] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:47 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0xffffffff00000000) 04:45:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:47 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) semctl$GETALL(0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000280)=""/245) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1, 0x10100}, {r2, 0x8644}], 0x2, 0x0, 0x0, 0x2ec) [ 205.253864][T11044] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. 04:45:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x60ff, 0x0, 0x267) 04:45:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:47 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x1700000, 0x8001) 04:45:47 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) shutdown(r4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_PID={0x8}, @IFLA_PORT_SELF={0x68, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_PROFILE={0x14, 0x2, 'cgroupselinux\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x90}}, 0x0) 04:45:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:47 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x4482, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1, 0x2005}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:47 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x1800000, 0x8001) [ 205.503359][T11079] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:47 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$packet_int(r5, 0x107, 0x12, &(0x7f0000000200), &(0x7f0000000400)=0x4) r6 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm-control\x00', 0x200, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r7, 0xae04) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f00000001c0)={0x0, 0x7}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000002c0)={r8, 0x4d0ea7fe}, &(0x7f0000000300)=0xc) close(r0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000440), &(0x7f0000000480)=0x4) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="510700311000130700000000000000000000000b00000000000000000000006aafd9668d43bd538941b1bfbfb9e40000ff0700000000000021000008000000000000000000", @ANYRES32=r9, @ANYRES32=0x0, @ANYRESOCT=r9], 0x4}}, 0x0) fdatasync(r9) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r10}], 0x2, 0x0, 0x0, 0x0) 04:45:47 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) shutdown(r4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_PID={0x8}, @IFLA_PORT_SELF={0x68, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_PROFILE={0x14, 0x2, 'cgroupselinux\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x90}}, 0x0) 04:45:47 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x2) 04:45:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x7100, 0x0, 0x267) 04:45:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(0x0, 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:47 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) shutdown(r4, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_PID={0x8}, @IFLA_PORT_SELF={0x68, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_PROFILE={0x14, 0x2, 'cgroupselinux\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x90}}, 0x0) 04:45:47 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f00000001c0)) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r4}], 0x2, 0x0, 0x0, 0x0) 04:45:47 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8002) 04:45:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 205.912942][T11116] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x15, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x7600, 0x0, 0x267) 04:45:48 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8003) 04:45:48 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r5 = gettid() sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_PID={0x8, 0x13, r5}, @IFLA_PORT_SELF={0x68, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_PROFILE={0x14, 0x2, 'cgroupselinux\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x90}}, 0x0) 04:45:48 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x628500, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000001c0)={'bond_slave_1\x00', {0x2, 0x4e21, @remote}}) r2 = fsopen(&(0x7f0000000000)='qnx6\x00', 0x1) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) socket$inet6(0xa, 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0xa, 0x2, 0x11) socket$kcm(0x2, 0x3, 0x2) r3 = socket$kcm(0xa, 0x6, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) setsockopt$sock_attach_bpf(r3, 0x10d, 0xb, &(0x7f0000000000)=r4, 0x4) readahead(r2, 0x1800000000, 0x8) r5 = epoll_create1(0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r9 = gettid() sendmsg$nl_route(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x84, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_NET_NS_PID={0x8, 0x13, r9}, @IFLA_PORT_SELF={0x5c, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x5}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x84}}, 0x0) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r10, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=ANY=[@ANYBLOB="38010000100013070000000000000000e000000200000000000000000070adb588d3b0bfe1d2817f8b7400"/55, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f0000000000000000000ffffffffffff0000000032000000ac14140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000400000000000000000048000200656362286369706865725f6e756c6c2900"/240], 0x138}}, 0x0) r11 = fcntl$getown(r10, 0x9) tgkill(r9, r11, 0x34) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r12 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r5}, {r12}], 0x2, 0x0, 0x0, 0x0) 04:45:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(0x0, 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 206.270809][T11150] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. 04:45:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x16, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:48 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8004) 04:45:48 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) socket$nl_xfrm(0x10, 0x3, 0x6) r4 = gettid() sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_PID={0x8, 0x13, r4}, @IFLA_PORT_SELF={0x68, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_PROFILE={0x14, 0x2, 'cgroupselinux\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x90}}, 0x0) [ 206.312987][T11158] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. [ 206.374303][T11163] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. 04:45:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x7f00, 0x0, 0x267) [ 206.445287][T11154] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. 04:45:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x17, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 206.486007][T11173] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. 04:45:48 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x7ffff000) 04:45:48 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = gettid() sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_PID={0x8, 0x13, r4}, @IFLA_PORT_SELF={0x68, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_PROFILE={0x14, 0x2, 'cgroupselinux\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x90}}, 0x0) [ 206.625703][T11163] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. 04:45:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xe0, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(0x0, 0x3e06, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:48 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0xffffffffffffffff) 04:45:48 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) lsetxattr$security_smack_transmute(&(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1, 0x2}, {r2, 0x100}], 0x2, 0x0, 0x0, 0x0) 04:45:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x9600, 0x0, 0x267) 04:45:48 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = gettid() sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8, 0x13, r2}, @IFLA_PORT_SELF={0x68, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_PROFILE={0x14, 0x2, 'cgroupselinux\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x90}}, 0x0) [ 206.795348][T11197] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xffe0, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:48 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) accept$alg(r2, 0x0, 0x0) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x17}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev={0xac, 0x14, 0x14, 0x15}, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}, 0x1, 0x0, 0x0, 0x2604c05b}, 0x0) accept4(r4, &(0x7f0000000180)=@x25, &(0x7f0000000000)=0x80, 0x80000) ppoll(&(0x7f0000000080)=[{r1, 0x801}, {r3, 0x8404}], 0x2, 0x0, 0x0, 0x0) 04:45:49 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x800) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:49 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = gettid() sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8, 0x13, r2}, @IFLA_PORT_SELF={0x68, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_PROFILE={0x14, 0x2, 'cgroupselinux\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x90}}, 0x0) 04:45:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x80800) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xffffffe0, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0xfc01, 0x0, 0x267) 04:45:49 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x2000d0b4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:49 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x21e63905546724dd, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000180)=0x200, &(0x7f00000001c0)=0x4) r2 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000000c0)) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000200), &(0x7f0000000280)=0x4) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r2}, {r3}], 0x2, 0x0, 0x0, 0x0) 04:45:49 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = gettid() sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8, 0x13, r2}, @IFLA_PORT_SELF={0x68, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_PROFILE={0x14, 0x2, 'cgroupselinux\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x90}}, 0x0) 04:45:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xffffffffffffffe0, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390100a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2e0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0xfd01, 0x0, 0x267) 04:45:49 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$l2tp(0x18, 0x1, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r4 = fcntl$dupfd(r3, 0x4e142173add5d265, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000080)=0xe8) 04:45:49 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000000)=[{r1}, {r2, 0x1}], 0x2, 0x0, 0x0, 0x0) 04:45:49 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r3 = gettid() sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_NET_NS_PID={0x8, 0x13, r3}, @IFLA_PORT_SELF={0x68, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_PROFILE={0x14, 0x2, 'cgroupselinux\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x90}}, 0x0) 04:45:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:49 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r3 = gettid() sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_NET_NS_PID={0x8, 0x13, r3}, @IFLA_PORT_SELF={0x68, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_PROFILE={0x14, 0x2, 'cgroupselinux\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x90}}, 0x0) 04:45:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0xff01, 0x0, 0x267) 04:45:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:49 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r3 = gettid() sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_NET_NS_PID={0x8, 0x13, r3}, @IFLA_PORT_SELF={0x68, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_PROFILE={0x14, 0x2, 'cgroupselinux\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x90}}, 0x0) 04:45:49 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000140)={0x0, 0xfffffffffffffeb9, &(0x7f0000000000)={&(0x7f0000000200)={0x20, r6, 0x439, 0x0, 0x0, {0xa}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x20}}, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0xcc, r6, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip_vti0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="ff452cff4c5e236a2edabfe0b5595eda"}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3ff}, @IPVS_CMD_ATTR_SERVICE={0x64, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x61}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100}]}, 0xcc}, 0x1, 0x0, 0x0, 0x8058019}, 0x88040) 04:45:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:50 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r3 = gettid() sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_NET_NS_PID={0x8, 0x13, r3}, @IFLA_PORT_SELF={0x68, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_PROFILE={0x14, 0x2, 'cgroupselinux\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x90}}, 0x0) 04:45:50 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0x1ffff, 0x0, 0x267) 04:45:50 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x840) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:50 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r3 = gettid() sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_NET_NS_PID={0x8, 0x13, r3}, @IFLA_PORT_SELF={0x68, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_PROFILE={0x14, 0x2, 'cgroupselinux\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x90}}, 0x0) 04:45:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:45:50 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa, 0xd104}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000200)={{0x3, 0x0, @identifier="4bf40cde6810d5375f4e6e54d5ccc9fd"}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$RTC_WKALM_RD(r4, 0x80287010, &(0x7f0000000000)) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r5}], 0x2, 0x0, 0x0, 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f0000000180)=0x0) r7 = syz_open_dev$dspn(&(0x7f0000000380)='/dev/dsp#\x00', 0x0, 0x88000) r8 = inotify_init1(0x0) r9 = inotify_add_watch(r8, &(0x7f00000002c0)='./file0\x00', 0x1000001) inotify_rm_watch(r8, r9) inotify_rm_watch(r7, r9) ioctl$VIDIOC_S_STD(r5, 0x40085618, &(0x7f00000001c0)=r6) 04:45:50 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r3 = gettid() sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_NET_NS_PID={0x8, 0x13, r3}, @IFLA_PORT_SELF={0x68, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_PROFILE={0x14, 0x2, 'cgroupselinux\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x90}}, 0x0) 04:45:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e24ef60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63000000800117009a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390100a9ceafd07e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2000052b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:50 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000001c0)={r1, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000200)=[@in6={0xa, 0x4e24, 0x983, @dev={0xfe, 0x80, [], 0xb}, 0x272}, @in={0x2, 0x4e22, @loopback}], 0x2c) r6 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCSCTTY(r6, 0x540e, 0x8) chroot(&(0x7f0000000000)='./file0\x00') r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000005c0)=@newsa={0x228, 0x10, 0x613, 0x0, 0x0, {{@in=@multicast2, @in, 0x0, 0xffff}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev={0xac, 0x14, 0x14, 0xff}, {0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, {}, {0x0, 0x0, 0x3}, 0x0, 0x0, 0xa, 0xd104}, [@algo_auth={0x138, 0x1, {{'md5-generic\x00'}, 0x778, "ba00d431ccc7eab5ac97faaba0e0fcd27a7c0a649fac233ed5af9ac70b466dffce9f3984b462f8c1defe66fe6ab87af09c31a6e47c95573bf3ebce3b3202679cae829b9c2eec484500398e8977721d4deff313fecc9793831f3352e9ecc72d17cdf424c4fafd2e4730d23e70dd7c451f068e012d6d2afe9fc8354b90d71195f8de997eb3f8aa7ec5193cc33a251bd2fc8ee3f1449fa7495cc4670ab2f51bf20a3d2429a3e3e0df472cb9e26cadbe4ccd1af2b3e7092c408293b4b8fe9048f0283f58236e4c91cc83da3fbbbafd9f01c39d94b13f5dc86208e44692a9e52333130d0c0daf12597f5e130c34a7abdfcc"}}]}, 0x228}}, 0x0) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@v2={0x5, 0x3, 0xa, 0x2, 0x36, "07705894d39ac120bfd802d239246070c451108c766dd7fecb5664c6cf6b5f7fd01420b61f32ac8e2862fdcc58f9ce7b6958456a32d1"}, 0x40, 0x1) sendfile(r0, r0, &(0x7f0000000040)=0x100000, 0x5) 04:45:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffde5, 0xfec00, 0x0, 0x267) 04:45:50 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r4 = gettid() sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_NET_NS_PID={0x8, 0x13, r4}, @IFLA_PORT_SELF={0x68, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_PROFILE={0x14, 0x2, 'cgroupselinux\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x90}}, 0x0) 04:45:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9e00300600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:45:50 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_MARK_BUFS(r5, 0x40206417, &(0x7f0000000000)={0x7, 0x25747223, 0x7, 0x8000, 0x19, 0x4}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 04:45:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28800) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x80800) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newlink={0x1d4, 0x10, 0xe3b, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20060}, [@IFLA_MASTER={0x8, 0xa, r2}, @IFLA_LINKINFO={0x1ac, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x19c, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x200}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="3ac7d85d2b57aff87f52e359db35f2e6"}, @tunl_policy=[@IFLA_IPTUN_TOS={0x0, 0x5, 0x5}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x1}, @IFLA_IPTUN_TOS={0xffef, 0x5, 0x80}], @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x0, 0xf, 0x98a0ff9719e46a8d}, @IFLA_IPTUN_ENCAP_FLAGS={0x0, 0x10, 0xd46}], @IFLA_IPTUN_FLOWINFO, @IFLA_IPTUN_ENCAP_LIMIT={0x5}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0xfffffffe}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_TOS={0x8, 0x5, 0x5}, @IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0xfffffffffffffe97}]}}}]}, 0x1d4}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 208.721069][T11353] validate_nla: 24 callbacks suppressed [ 208.721075][T11353] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 208.737495][T11347] kasan: CONFIG_KASAN_INLINE enabled [ 208.746638][T11347] kasan: GPF could be caused by NULL-ptr deref or user memory access 04:45:50 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='ramf\x14\xe4\x02<\x97\x15js\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$LOOP_GET_STATUS64(r4, 0x4c05, &(0x7f0000000280)) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) [ 208.771942][T11353] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 208.780595][T11353] net_ratelimit: 2 callbacks suppressed [ 208.780603][T11353] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 208.807336][T11361] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 208.816539][T11361] __nla_validate_parse: 4 callbacks suppressed [ 208.816544][T11361] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. [ 208.829979][T11347] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 208.839525][T11347] CPU: 0 PID: 11347 Comm: syz-executor.3 Not tainted 5.4.0-rc6+ #0 [ 208.847439][T11347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.857518][T11347] RIP: 0010:kvm_coalesced_mmio_init+0x59/0xf0 [ 208.863591][T11347] Code: 00 00 00 fc ff df e8 46 7d 6b 00 48 c1 e3 06 49 be 00 00 00 00 80 08 05 00 49 01 de 49 8d bf d8 96 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 74 05 e8 6b bb a4 00 4d 89 b7 d8 96 00 00 49 8d bf [ 208.883226][T11347] RSP: 0018:ffff888060467d10 EFLAGS: 00010206 [ 208.889314][T11347] RAX: 00000000000012db RBX: fffa800090d28000 RCX: 0000000000040000 [ 208.897305][T11347] RDX: ffffc9000c588000 RSI: 0000000000001e8b RDI: 00000000000096d8 [ 208.905290][T11347] RBP: ffff888060467d30 R08: ffffffff83486c5a R09: ffffed1015d46b05 [ 208.913258][T11347] R10: ffffed1015d46b05 R11: 0000000000000000 R12: dffffc0000000000 [ 208.921212][T11347] R13: 0000000000000000 R14: ffff888090d28000 R15: 0000000000000000 [ 208.929776][T11347] FS: 00007f1b42ee5700(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 208.938688][T11347] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 208.945250][T11347] CR2: 0000001b30f21000 CR3: 0000000093917000 CR4: 00000000001406f0 [ 208.953205][T11347] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 208.961156][T11347] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 208.969106][T11347] Call Trace: [ 208.972382][T11347] kvm_dev_ioctl+0x18fa/0x1fd0 [ 208.977129][T11347] ? kvm_reboot+0x40/0x40 [ 208.981442][T11347] do_vfs_ioctl+0x744/0x1730 [ 208.986012][T11347] ? __fget+0x441/0x510 [ 208.990148][T11347] ? tomoyo_file_ioctl+0x23/0x30 [ 208.995066][T11347] ? security_file_ioctl+0xa1/0xd0 [ 209.000155][T11347] __x64_sys_ioctl+0xe3/0x120 [ 209.004813][T11347] do_syscall_64+0xf7/0x1c0 [ 209.009295][T11347] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.015164][T11347] RIP: 0033:0x45a219 [ 209.019071][T11347] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 209.038652][T11347] RSP: 002b:00007f1b42ee4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 209.047076][T11347] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a219 [ 209.055026][T11347] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000003 [ 209.062977][T11347] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:45:51 executing program 1: socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r3 = gettid() sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_NET_NS_PID={0x8, 0x13, r3}, @IFLA_PORT_SELF={0x68, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_PROFILE={0x14, 0x2, 'cgroupselinux\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x90}}, 0x0) [ 209.070926][T11347] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1b42ee56d4 [ 209.078871][T11347] R13: 00000000004c348b R14: 00000000004d7708 R15: 00000000ffffffff [ 209.086830][T11347] Modules linked in: [ 209.094477][ T3900] kobject: 'loop2' (00000000d665e927): kobject_uevent_env [ 209.111535][ T3900] kobject: 'loop2' (00000000d665e927): fill_kobj_path: path = '/devices/virtual/block/loop2' 04:45:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ffe000600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 209.134873][ T3900] kobject: 'loop1' (00000000c9e23af7): kobject_uevent_env [ 209.142511][T11347] ---[ end trace 35d2b027f0544f74 ]--- [ 209.143624][ T3900] kobject: 'loop1' (00000000c9e23af7): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 209.150978][T11347] RIP: 0010:kvm_coalesced_mmio_init+0x59/0xf0 [ 209.173274][ T3900] kobject: 'loop5' (00000000e10da78b): kobject_uevent_env [ 209.178940][T11347] Code: 00 00 00 fc ff df e8 46 7d 6b 00 48 c1 e3 06 49 be 00 00 00 00 80 08 05 00 49 01 de 49 8d bf d8 96 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 74 05 e8 6b bb a4 00 4d 89 b7 d8 96 00 00 49 8d bf [ 209.200232][ T3900] kobject: 'loop5' (00000000e10da78b): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 209.207613][T11347] RSP: 0018:ffff888060467d10 EFLAGS: 00010206 [ 209.219760][T11347] RAX: 00000000000012db RBX: fffa800090d28000 RCX: 0000000000040000 [ 209.238574][T11347] RDX: ffffc9000c588000 RSI: 0000000000001e8b RDI: 00000000000096d8 [ 209.246898][T11347] RBP: ffff888060467d30 R08: ffffffff83486c5a R09: ffffed1015d46b05 [ 209.259418][T11347] R10: ffffed1015d46b05 R11: 0000000000000000 R12: dffffc0000000000 [ 209.260135][T11369] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 209.274503][T11347] R13: 0000000000000000 R14: ffff888090d28000 R15: 0000000000000000 [ 209.283757][T11369] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 209.291948][T11369] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 209.295208][T11347] FS: 00007f1b42ee5700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 04:45:51 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) write(r0, &(0x7f0000000100)="e1a30c5358ac0fe557c317f7aa2ea5193479d6de27edaae8984f7ad37a9f35f0a1ef188563ea126801b1908c36fcce93cad69773ad8bd56cd453187fc0edea4e5708c9184bd2d431be6ea62234bbc97c3b963de24f342971278dc463c8c19ab99c39687d539c3aadfea3010cf98596da39eb76dc8aafb599cb08598d46e8b22035bdb16367174dbac59837790e58bfdb019d818475e9d78ecb3ed15f074eed129499020f85c01e9e493472e2f6f5cad2574eb4b39dd2037b4e369659ba0ff519deed4720a6e55ff66744d2f7b5b1bfcd505b7ecc6269485d46a2c53ef36f480838594f04c18153192b5c252a6a1413ad", 0xf0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000080)={0x3}, 0x4) sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000000)={{0xe, 0x1}, 0xc8, 0x1ff, 0x85, 0x0, &(0x7f0000000200)="89d6a0a8d166a8cbbcd4f3bde85f25548ece14eb809b8da42fb2693a7b009c8dce05d5e90b23adfa2b16d8fee0af805c0631ed8c5825b79d9f0f67d7b8c0e5d2b29452ea7ab9cf00d647e0175ace7edf7efdeb306179043fda5876231a7545e9489217bb8f94879b973e4ef6c593201829147bb56fc0ce9514b48898bbd803e75e98a69c1d"}) 04:45:51 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = epoll_create1(0x100000) r1 = epoll_create1(0x0) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0xfffffffffffffff7, 0x40000) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r1}, {r2}], 0x2, 0x0, 0x0, 0x0) 04:45:51 executing program 1: socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r3 = gettid() sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_NET_NS_PID={0x8, 0x13, r3}, @IFLA_PORT_SELF={0x68, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_PROFILE={0x10, 0x2, 'eth1\\ppp0]\x00'}, @IFLA_PORT_REQUEST={0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "441fa27574fc0e85df6790088de8fc0a"}, @IFLA_PORT_PROFILE={0x14, 0x2, 'cgroupselinux\x00'}, @IFLA_PORT_PROFILE={0xc, 0x2, 'lo(++{\x00'}]}]}, 0x90}}, 0x0) [ 209.348809][T11347] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 209.361251][ T3900] kobject: 'loop1' (00000000c9e23af7): kobject_uevent_env [ 209.375626][ T3900] kobject: 'loop1' (00000000c9e23af7): fill_kobj_path: path = '/devices/virtual/block/loop1' 04:45:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x2f5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ffe0ff600d698cb89e14f088a81fffffff00001800632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) [ 209.395327][T11347] CR2: 00007fd4ce725000 CR3: 0000000093917000 CR4: 00000000001406e0 [ 209.408582][T11347] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 209.419706][T11387] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 209.432036][ T3900] kobject: 'loop2' (00000000d665e927): kobject_uevent_env [ 209.440433][T11347] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 209.449102][ T3900] kobject: 'loop2' (00000000d665e927): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 209.465121][T11347] Kernel panic - not syncing: Fatal exception [ 209.468848][T11387] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 209.472441][T11347] Kernel Offset: disabled [ 209.484795][T11347] Rebooting in 86400 seconds..