[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 10.239254] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 22.385602] random: sshd: uninitialized urandom read (32 bytes read) [ 22.410222] random: crng init done Warning: Permanently added '10.128.10.63' (ECDSA) to the list of known hosts. 2019/09/10 10:07:47 fuzzer started 2019/09/10 10:07:48 dialing manager at 10.128.0.26:42877 2019/09/10 10:07:48 syscalls: 1377 2019/09/10 10:07:48 code coverage: enabled 2019/09/10 10:07:48 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/09/10 10:07:48 extra coverage: extra coverage is not supported by the kernel 2019/09/10 10:07:48 setuid sandbox: enabled 2019/09/10 10:07:48 namespace sandbox: enabled 2019/09/10 10:07:48 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/10 10:07:48 fault injection: kernel does not have systematic fault injection support 2019/09/10 10:07:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/10 10:07:48 net packet injection: enabled 2019/09/10 10:07:48 net device setup: enabled 10:08:41 executing program 0: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x400, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0xfffffffffffffc2a, 0x7, 0xc8ea, 0x8, 0xfffffffffffffc01}, 0x14) fdatasync(r0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/validatetrans\x00', 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20210800}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xbc, r2, 0x3e1597490d6aa892, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x81}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x62a6}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x19}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfff}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x4004050}, 0x80) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x20000, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x10000, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r3, r4, 0xfffffffffffffbff, 0xb) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000340)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x3) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x6e62cea9c56407d1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r5, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000480)={0x4, 0x5}, 0x0, 0x0, &(0x7f00000004c0)={0x5, 0x8, 0x9, 0x3}, &(0x7f0000000500)=0x101, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x800000000000000}}, 0x10) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x4) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000680)='/dev/zero\x00', 0x51200, 0x0) ioctl$KDSETLED(r6, 0x4b32, 0x20) clock_gettime(0x0, &(0x7f00000031c0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{&(0x7f00000006c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/216, 0xd8}], 0x1, &(0x7f0000000880)=""/219, 0xdb}, 0x8}, {{&(0x7f0000000980)=@nl=@proc, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000a00)=""/186, 0xba}, {&(0x7f0000000ac0)=""/240, 0xf0}, {&(0x7f0000000bc0)=""/95, 0x5f}, {&(0x7f0000000c40)=""/33, 0x21}], 0x4, &(0x7f0000000cc0)=""/106, 0x6a}, 0x55}, {{&(0x7f0000000d40)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000dc0)=""/215, 0xd7}], 0x1, &(0x7f0000000f00)=""/152, 0x98}, 0x1b9ed554}, {{&(0x7f0000000fc0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000002140)=[{&(0x7f0000001040)=""/6, 0x6}, {&(0x7f0000001080)=""/184, 0xb8}, {&(0x7f0000001140)=""/4096, 0x1000}], 0x3, &(0x7f0000002180)=""/34, 0x22}, 0x6}, {{&(0x7f00000021c0)=@nl=@proc, 0x80, &(0x7f0000002380)=[{&(0x7f0000002240)=""/137, 0x89}, {&(0x7f0000002300)=""/128, 0x80}], 0x2, &(0x7f00000023c0)=""/123, 0x7b}, 0x3f}, {{&(0x7f0000002440)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000002500)=[{&(0x7f00000024c0)=""/47, 0x2f}], 0x1, &(0x7f0000002540)=""/165, 0xa5}, 0x101}, {{0x0, 0x0, &(0x7f0000002ac0)=[{&(0x7f0000002600)=""/151, 0x97}, {&(0x7f00000026c0)=""/181, 0xb5}, {&(0x7f0000002780)=""/163, 0xa3}, {&(0x7f0000002840)=""/236, 0xec}, {&(0x7f0000002940)=""/143, 0x8f}, {&(0x7f0000002a00)=""/36, 0x24}, {&(0x7f0000002a40)=""/114, 0x72}], 0x7, &(0x7f0000002b40)=""/254, 0xfe}, 0x6}, {{0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f0000002c40)}, {&(0x7f0000002c80)=""/243, 0xf3}, {&(0x7f0000002d80)=""/215, 0xd7}, {&(0x7f0000002e80)=""/34, 0x22}, {&(0x7f0000002ec0)=""/67, 0x43}], 0x5}, 0x5}], 0x8, 0x20, &(0x7f0000003200)={r7, r8+30000000}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003240)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000003340)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000003380)={{{@in=@rand_addr=0x8, @in=@empty, 0x4e22, 0x7, 0x4e20, 0x0, 0x2, 0x20, 0x20, 0x5c, r9, r10}, {0xd225, 0x40, 0x11ed, 0x4, 0x400, 0x4, 0x1, 0xffffffff}, {0x20, 0x6, 0xffffffffffffffe0}, 0x7ab4, 0x6e6bb3, 0x1, 0x0, 0x1, 0x3}, {{@in=@broadcast, 0x4d5, 0x32}, 0x14, @in=@multicast1, 0x3504, 0x3, 0x1, 0x2, 0x2, 0x0, 0x9}}, 0xe8) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) setxattr$security_smack_transmute(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000003500)='TRUE', 0x4, 0x1) r11 = open(&(0x7f0000003540)='./file0\x00', 0x1, 0x81) setsockopt$inet_tcp_TCP_CONGESTION(r11, 0x6, 0xd, &(0x7f0000003580)='reno\x00', 0x5) r12 = openat$cgroup_ro(r6, &(0x7f00000035c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TCSETX(r12, 0x5433, &(0x7f0000003600)={0x100000001, 0xffff, [0x81, 0x8d9b, 0x3, 0xfffffffeffffffff, 0x4], 0x2}) getpid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0xffffffffffffffff, 0x10, &(0x7f0000003640)={0x80000001}) getegid() 10:08:41 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) 10:08:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0xffffff84, 0xa, 0xff00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x6, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 10:08:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000a0000000000000000000000090100000000000000010000040000000200000000020000000000000000300000612e00"], &(0x7f0000004600)=""/210, 0x4f, 0x193, 0x1}, 0x20) 10:08:41 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:41 executing program 1: socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x27c) r0 = gettid() write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000100)) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0xfffffffffffffeca) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) pause() r2 = dup(r1) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000140)={'veth0_to_team\x00', {0x2, 0x0, @dev}}) tkill(r0, 0x1000000000016) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 84.983785] audit: type=1400 audit(1568110123.465:5): avc: denied { associate } for pid=2099 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 10:08:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000340)={0x0, 0x2, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x3e, 0x105, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) [ 85.071823] audit: type=1400 audit(1568110123.555:6): avc: denied { create } for pid=2962 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 10:08:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) [ 85.132966] audit: type=1400 audit(1568110123.615:7): avc: denied { write } for pid=2962 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 10:08:43 executing program 2: [ 85.218371] audit: type=1400 audit(1568110123.705:8): avc: denied { read } for pid=2962 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 10:08:43 executing program 2: 10:08:43 executing program 5: 10:08:43 executing program 5: 10:08:43 executing program 0: 10:08:43 executing program 2: 10:08:43 executing program 5: 10:08:43 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) [ 85.269932] audit: type=1400 audit(1568110123.755:9): avc: denied { prog_load } for pid=3021 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 10:08:43 executing program 5: 10:08:44 executing program 1: 10:08:44 executing program 0: 10:08:44 executing program 2: 10:08:44 executing program 5: 10:08:44 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:44 executing program 3: 10:08:44 executing program 0: 10:08:44 executing program 5: 10:08:44 executing program 3: 10:08:44 executing program 2: 10:08:44 executing program 1: 10:08:44 executing program 3: 10:08:44 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:44 executing program 0: 10:08:44 executing program 5: 10:08:44 executing program 2: 10:08:44 executing program 1: 10:08:44 executing program 3: 10:08:44 executing program 5: 10:08:44 executing program 0: 10:08:44 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:44 executing program 1: 10:08:44 executing program 2: 10:08:44 executing program 3: 10:08:44 executing program 5: 10:08:44 executing program 2: 10:08:44 executing program 3: 10:08:44 executing program 1: 10:08:44 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:44 executing program 0: 10:08:44 executing program 5: 10:08:44 executing program 3: 10:08:44 executing program 2: 10:08:44 executing program 0: 10:08:44 executing program 1: 10:08:44 executing program 5: 10:08:44 executing program 2: 10:08:44 executing program 3: 10:08:44 executing program 0: 10:08:44 executing program 5: 10:08:44 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:44 executing program 2: 10:08:44 executing program 3: 10:08:44 executing program 1: 10:08:44 executing program 0: 10:08:44 executing program 1: 10:08:44 executing program 5: 10:08:44 executing program 2: 10:08:44 executing program 0: 10:08:44 executing program 3: 10:08:44 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:44 executing program 5: 10:08:44 executing program 1: 10:08:44 executing program 2: 10:08:45 executing program 5: 10:08:45 executing program 3: 10:08:45 executing program 2: 10:08:45 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:45 executing program 1: 10:08:45 executing program 0: 10:08:45 executing program 2: 10:08:45 executing program 5: 10:08:45 executing program 3: 10:08:45 executing program 1: 10:08:45 executing program 0: 10:08:45 executing program 5: 10:08:45 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:45 executing program 2: 10:08:45 executing program 1: 10:08:45 executing program 3: 10:08:45 executing program 0: 10:08:45 executing program 2: 10:08:45 executing program 3: 10:08:45 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:45 executing program 5: 10:08:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) setresuid(0x0, 0xee01, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="480000001400190c0c004beafd0d8c560a84ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00000000000000", 0x48}], 0x1) 10:08:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000140)=[{r1}], 0x1, 0xe6) 10:08:45 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2320204644b19e630466c83a31a32e3bff5161cd90e67f4f17970613272338047b93b5b73d865426894e87e52cbf13c097d652ec019f450942e80d"], 0x3) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 10:08:45 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x8, 0x8000, 0x2000008000000001, 0x1}, 0x2c5) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x73fffb, 0x0, 0x820000, 0x0}, 0x2c) 10:08:45 executing program 3: r0 = socket$inet6(0xa, 0x4000000080002, 0x0) connect$inet6(r0, &(0x7f0000005d00)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) 10:08:45 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:45 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:45 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:45 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:45 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:45 executing program 3: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000180)={0x7, 0x21, 0x2}, 0x7) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() setxattr$security_evm(&(0x7f0000000200)='./file0\x00', &(0x7f00000003c0)='security.evm\x00', &(0x7f0000000540)=ANY=[@ANYBLOB], 0x7, 0x0) waitid(0x1, r2, &(0x7f0000000280), 0x2, 0x0) setxattr$security_smack_transmute(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xffffffffffffff4d, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f00000001c0), 0x4) r3 = socket(0x200000000000011, 0x2, 0xdd86) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'ip6tnl0\x00', 0x0}) bind$packet(r3, &(0x7f0000000040)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x1}}, 0x30) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="400000000000000008001b000000"], 0x30}}, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) syz_open_pts(r1, 0x0) 10:08:45 executing program 1: r0 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r0, &(0x7f0000000000), 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r4 = dup2(r3, r3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000180), 0x132472) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000080)=@alg, 0x80, &(0x7f0000000180)=[{&(0x7f0000000100)=""/90, 0x5a}, {&(0x7f0000000340)=""/231, 0xe7}], 0x2, &(0x7f0000000200)=""/55, 0x37}, 0x80000000) sendmmsg(r0, &(0x7f00000002c0)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000000040)="3f6b9c7bb156507048284dc93fc1c2ddadb65d197997c114536b4a384a0b9bbe51721b99ca74bded", 0x28}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340), 0xffffffffffffff61}}], 0x4000000000001d9, 0x0) 10:08:45 executing program 5: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) r1 = syz_open_procfs(r0, 0x0) pipe2(&(0x7f0000000340), 0x0) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) socket$unix(0x1, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000300)={0x18, 0x1, 0x0, {0x8000}}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000240)='logon\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$inet6_udplite(0xa, 0x2, 0x88) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r4, &(0x7f00000000c0)=""/57, 0x39) r5 = request_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000080)={'$\x00z', 0x1}, &(0x7f0000000380)='}\x00', r4) keyctl$revoke(0x3, r5) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a0f, 0x1700) [ 86.908164] hrtimer: interrupt took 26202 ns [ 86.959807] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 10:08:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000140)=[{r1}], 0x1, 0xe6) 10:08:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:45 executing program 1: r0 = gettid() ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) write$FUSE_LK(0xffffffffffffffff, &(0x7f00000005c0)={0x28, 0x0, 0x3, {{0x2, 0x6, 0x0, r0}}}, 0x28) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) finit_module(r1, &(0x7f0000000380)='vboxnet0&vmnet0posix_acl_access\x00', 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000400)='\x00', 0xffffffffffffffff}, 0x30) r3 = syz_open_procfs(0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000000)) flistxattr(r2, &(0x7f00000004c0)=""/217, 0xd9) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) r5 = dup2(r4, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000180), 0x132472) write$UHID_CREATE2(r5, &(0x7f0000000740)={0xb, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0xd4, 0xa9, 0x2, 0x9, 0x27cdfa52, 0xf000000000000000, "94d1af4999d2e8b9fa561d57f2915ca4f2bdc62aabd264e8debab26ed1f1b2c71ee4ba1e8551386d9ea095ffbd3c43cbf8761a7f2b48aeece6033eccc8bae4bd237805bb61334f33b0de6d9a8fc669843669be33898baf240c5f64fcdf1f02348c3d92e4e3d5bc0a100f9945c4ab715731b7b48f8aa2843ba3002826172d44158aa82ada664c5dac1d5f78137957d44ec536e78d1dead13bf8689ea194c977adeb39ecb15fd251fd5511294df8b49a8008c276bf885053789cbacf23891ca0deb25b368af313e5fe758d900a1519f9a12884fa0b"}, 0x1ec) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) geteuid() ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f00000000c0)=0xdc4) getsockopt$EBT_SO_GET_INIT_INFO(r3, 0x0, 0x82, &(0x7f0000000680)={'filter\x00'}, &(0x7f0000000700)=0x78) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') clock_getres(0x1, &(0x7f0000000480)) sendmsg$FOU_CMD_DEL(r3, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="18c5410a58ced81b8151000000", @ANYRES16=r6, @ANYBLOB="200026bd7000bff6098a6df7c302ae99ffdb"], 0x18}, 0x1, 0x0, 0x0, 0x24000800}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xa2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xeae5ca29f663a672, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x2) request_key(0x0, &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000003c0)='\x00', 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getrandom(&(0x7f0000000080)=""/59, 0xfec6, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000180)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000400)="11dca50d5c0bcfe47bf070") splice(r7, 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1) 10:08:45 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000180), 0x132472) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0xc) get_robust_list(r4, &(0x7f0000000380)=&(0x7f0000000340)={&(0x7f0000000180)={&(0x7f0000000140)}, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)}}, &(0x7f00000003c0)=0x18) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'\x00\x00\x00\xe6\xff\xff\xff\x00\x00\x00\x00\x00\x02\x00', 0x5002}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r6 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x2007fff) sendfile(r0, r6, 0x0, 0x800000000024) 10:08:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:45 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:45 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:45 executing program 3: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000180)={0x7, 0x21, 0x2}, 0x7) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() setxattr$security_evm(&(0x7f0000000200)='./file0\x00', &(0x7f00000003c0)='security.evm\x00', &(0x7f0000000540)=ANY=[@ANYBLOB], 0x7, 0x0) waitid(0x1, r2, &(0x7f0000000280), 0x2, 0x0) setxattr$security_smack_transmute(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xffffffffffffff4d, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f00000001c0), 0x4) r3 = socket(0x200000000000011, 0x2, 0xdd86) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'ip6tnl0\x00', 0x0}) bind$packet(r3, &(0x7f0000000040)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x1}}, 0x30) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="400000000000000008001b000000"], 0x30}}, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) syz_open_pts(r1, 0x0) [ 87.127884] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 10:08:45 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:45 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) [ 87.339145] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 10:08:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000140)=[{r1}], 0x1, 0xe6) 10:08:46 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:46 executing program 5: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) r1 = syz_open_procfs(r0, 0x0) pipe2(&(0x7f0000000340), 0x0) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) socket$unix(0x1, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000300)={0x18, 0x1, 0x0, {0x8000}}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000240)='logon\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$inet6_udplite(0xa, 0x2, 0x88) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r4, &(0x7f00000000c0)=""/57, 0x39) r5 = request_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000080)={'$\x00z', 0x1}, &(0x7f0000000380)='}\x00', r4) keyctl$revoke(0x3, r5) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a0f, 0x1700) 10:08:46 executing program 1: r0 = gettid() ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) write$FUSE_LK(0xffffffffffffffff, &(0x7f00000005c0)={0x28, 0x0, 0x3, {{0x2, 0x6, 0x0, r0}}}, 0x28) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) finit_module(r1, &(0x7f0000000380)='vboxnet0&vmnet0posix_acl_access\x00', 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000400)='\x00', 0xffffffffffffffff}, 0x30) r3 = syz_open_procfs(0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000000)) flistxattr(r2, &(0x7f00000004c0)=""/217, 0xd9) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) r5 = dup2(r4, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000180), 0x132472) write$UHID_CREATE2(r5, &(0x7f0000000740)={0xb, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0xd4, 0xa9, 0x2, 0x9, 0x27cdfa52, 0xf000000000000000, "94d1af4999d2e8b9fa561d57f2915ca4f2bdc62aabd264e8debab26ed1f1b2c71ee4ba1e8551386d9ea095ffbd3c43cbf8761a7f2b48aeece6033eccc8bae4bd237805bb61334f33b0de6d9a8fc669843669be33898baf240c5f64fcdf1f02348c3d92e4e3d5bc0a100f9945c4ab715731b7b48f8aa2843ba3002826172d44158aa82ada664c5dac1d5f78137957d44ec536e78d1dead13bf8689ea194c977adeb39ecb15fd251fd5511294df8b49a8008c276bf885053789cbacf23891ca0deb25b368af313e5fe758d900a1519f9a12884fa0b"}, 0x1ec) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) geteuid() ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f00000000c0)=0xdc4) getsockopt$EBT_SO_GET_INIT_INFO(r3, 0x0, 0x82, &(0x7f0000000680)={'filter\x00'}, &(0x7f0000000700)=0x78) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') clock_getres(0x1, &(0x7f0000000480)) sendmsg$FOU_CMD_DEL(r3, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="18c5410a58ced81b8151000000", @ANYRES16=r6, @ANYBLOB="200026bd7000bff6098a6df7c302ae99ffdb"], 0x18}, 0x1, 0x0, 0x0, 0x24000800}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xa2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xeae5ca29f663a672, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x2) request_key(0x0, &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000003c0)='\x00', 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getrandom(&(0x7f0000000080)=""/59, 0xfec6, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000180)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000400)="11dca50d5c0bcfe47bf070") splice(r7, 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1) 10:08:46 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000180)={0x7, 0x21, 0x2}, 0x7) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() setxattr$security_evm(&(0x7f0000000200)='./file0\x00', &(0x7f00000003c0)='security.evm\x00', &(0x7f0000000540)=ANY=[@ANYBLOB], 0x7, 0x0) waitid(0x1, r2, &(0x7f0000000280), 0x2, 0x0) setxattr$security_smack_transmute(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xffffffffffffff4d, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f00000001c0), 0x4) r3 = socket(0x200000000000011, 0x2, 0xdd86) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'ip6tnl0\x00', 0x0}) bind$packet(r3, &(0x7f0000000040)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x1}}, 0x30) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="400000000000000008001b000000"], 0x30}}, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) syz_open_pts(r1, 0x0) 10:08:46 executing program 3: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000180)={0x7, 0x21, 0x2}, 0x7) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() setxattr$security_evm(&(0x7f0000000200)='./file0\x00', &(0x7f00000003c0)='security.evm\x00', &(0x7f0000000540)=ANY=[@ANYBLOB], 0x7, 0x0) waitid(0x1, r2, &(0x7f0000000280), 0x2, 0x0) setxattr$security_smack_transmute(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0xffffffffffffff4d, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f00000001c0), 0x4) r3 = socket(0x200000000000011, 0x2, 0xdd86) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'ip6tnl0\x00', 0x0}) bind$packet(r3, &(0x7f0000000040)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x1}}, 0x30) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="400000000000000008001b000000"], 0x30}}, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) syz_open_pts(r1, 0x0) 10:08:46 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000140)=[{r1}], 0x1, 0xe6) 10:08:46 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:46 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:46 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:46 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) [ 88.188150] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 10:08:46 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:46 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) [ 88.289567] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 88.449783] syz-executor.2 (3319) used greatest stack depth: 24088 bytes left 10:08:47 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x18, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'gretap0\x00', 0x2}, 0x18) 10:08:47 executing program 1: r0 = gettid() ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) write$FUSE_LK(0xffffffffffffffff, &(0x7f00000005c0)={0x28, 0x0, 0x3, {{0x2, 0x6, 0x0, r0}}}, 0x28) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) finit_module(r1, &(0x7f0000000380)='vboxnet0&vmnet0posix_acl_access\x00', 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000400)='\x00', 0xffffffffffffffff}, 0x30) r3 = syz_open_procfs(0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000000)) flistxattr(r2, &(0x7f00000004c0)=""/217, 0xd9) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) r5 = dup2(r4, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000180), 0x132472) write$UHID_CREATE2(r5, &(0x7f0000000740)={0xb, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0xd4, 0xa9, 0x2, 0x9, 0x27cdfa52, 0xf000000000000000, "94d1af4999d2e8b9fa561d57f2915ca4f2bdc62aabd264e8debab26ed1f1b2c71ee4ba1e8551386d9ea095ffbd3c43cbf8761a7f2b48aeece6033eccc8bae4bd237805bb61334f33b0de6d9a8fc669843669be33898baf240c5f64fcdf1f02348c3d92e4e3d5bc0a100f9945c4ab715731b7b48f8aa2843ba3002826172d44158aa82ada664c5dac1d5f78137957d44ec536e78d1dead13bf8689ea194c977adeb39ecb15fd251fd5511294df8b49a8008c276bf885053789cbacf23891ca0deb25b368af313e5fe758d900a1519f9a12884fa0b"}, 0x1ec) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) geteuid() ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f00000000c0)=0xdc4) getsockopt$EBT_SO_GET_INIT_INFO(r3, 0x0, 0x82, &(0x7f0000000680)={'filter\x00'}, &(0x7f0000000700)=0x78) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') clock_getres(0x1, &(0x7f0000000480)) sendmsg$FOU_CMD_DEL(r3, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="18c5410a58ced81b8151000000", @ANYRES16=r6, @ANYBLOB="200026bd7000bff6098a6df7c302ae99ffdb"], 0x18}, 0x1, 0x0, 0x0, 0x24000800}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xa2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xeae5ca29f663a672, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x2) request_key(0x0, &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000003c0)='\x00', 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getrandom(&(0x7f0000000080)=""/59, 0xfec6, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000180)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000400)="11dca50d5c0bcfe47bf070") splice(r7, 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1) 10:08:47 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:47 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(&(0x7f0000000140)=[{}], 0x1, 0xe6) 10:08:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x4000003, 0xc0e) timer_create(0x7, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="025bb2ef021d53375506c1f7b36a4b810594e369f8765e8225ef38f733256ce0ddf25485200a"], 0x26) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000640)={&(0x7f00000003c0), 0xc, &(0x7f0000000600)}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000180), 0x132472) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) dup2(r4, r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r5, &(0x7f0000000080), 0x1c) r6 = dup2(r5, r5) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r6, 0x6, 0x16, &(0x7f0000000180), 0x132472) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000400)="11dca50d5c0bcfe47bf070") r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r8, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r8, &(0x7f0000000080), 0x1c) r9 = dup2(r8, r8) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r9, 0x6, 0x16, &(0x7f0000000180), 0x132472) r10 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r10, 0x1000008912, &(0x7f0000000400)="11dca50d5c0bcfe47bf070") write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[], @ANYPTR=&(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16=0x0], @ANYRES64=r3, @ANYPTR64=&(0x7f0000000140)=ANY=[], @ANYRES64=0x0, @ANYRESHEX, @ANYRES64, @ANYRES64, @ANYRESHEX=r1, @ANYRESHEX]], 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x10002) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x10, 0xffffffffffffffff, 0x0) r11 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r11, 0x107, 0x5, 0x0, 0x0) 10:08:47 executing program 5: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0x8, 0x313b, 0x8, 0x3, 0x15, 0x6, 0x1000, 0x7, 0x9, 0xd2, 0x4, 0xcd3}) seccomp(0x1, 0x0, &(0x7f0000001980)={0x2, &(0x7f0000000180)=[{0x80}, {0x6, 0x0, 0x0, 0x50000}]}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 10:08:47 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:47 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:47 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:47 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/protocols\x00') ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') preadv(r2, &(0x7f00000017c0), 0x3cc, 0x91) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x1, 0xfffffffffffffffc}]}, 0xc, 0x0) 10:08:47 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) [ 89.117918] audit: type=1400 audit(1568110127.605:10): avc: denied { setopt } for pid=3344 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 10:08:47 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:47 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$P9_RFLUSH(r1, &(0x7f00000000c0)={0x7, 0x6d, 0x2}, 0x7) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) syncfs(r0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000300)={0x2a, 0x6, 0x6, 0xf, 0x5, 0x8, 0x4, 0x125, 0xffffffffffffffff}) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000280)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x321, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000240)='ip6gre0\x00', 0x400000000000, 0x8, 0x1}) ptrace$pokeuser(0x6, r2, 0x388, 0xfffffffffffffffe) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000340)) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x7) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/checkreqprot\x00', 0x4040, 0x0) accept$packet(r4, &(0x7f0000000440), &(0x7f0000000480)=0x14) write$uinput_user_dev(r3, &(0x7f0000000600)={'syz0\x00', {0x0, 0x9, 0x3, 0xfffffffffffffffd}, 0x17, [0x9, 0x4, 0x6, 0x8, 0x10000, 0x7fffffff, 0x7fe00000, 0xba, 0x2, 0x5, 0x7ff, 0x8, 0x5, 0x8000000002, 0x1, 0xfffffffffffff801, 0x40, 0x9183, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff, 0x1, 0x8001, 0x6, 0x2cea, 0x1, 0xfffffffffffffffa, 0x6, 0xffffffffffffffff, 0x800, 0xffffffffffffffe1, 0x0, 0x6, 0x0, 0x3, 0x2, 0x8, 0x3ff, 0x3e4c, 0x4, 0x8, 0x2, 0x6, 0x7, 0x3, 0x7, 0x4a, 0x0, 0xfff, 0x7fff, 0xfff, 0x1, 0x7fffffff, 0x100000000, 0x1ff, 0x7, 0x0, 0x0, 0x401, 0xff6, 0x1f, 0xffffffffffff97fe, 0x4, 0x7f], [0x80000001, 0x5, 0x656, 0x8000, 0xfffffffffffffff8, 0x6, 0x1, 0x2, 0x800000ff, 0xa, 0x1, 0x5, 0x3, 0x8, 0x7, 0x101, 0x20, 0x3ff, 0x7, 0x1, 0x0, 0x8000, 0x400000000000000, 0x20, 0x3ff, 0x4, 0xff, 0x100, 0x618, 0x7, 0x2, 0xfffffffffffffffe, 0x3f, 0x2, 0xffffffffffffff81, 0x6, 0x1000000, 0x2, 0xfffffffffffffbff, 0x100000001, 0x0, 0x100000001, 0x101, 0x5, 0xffffffff80000001, 0x9aa, 0x100, 0xffff, 0x100, 0x12, 0x4dd4a9a9, 0x40000000000000, 0xe1f8, 0x6, 0xfffffffffffffff9, 0x9, 0x1, 0xffffffffffffffff, 0x3, 0x81, 0x80, 0x2, 0xfffffffffffffeff, 0x7f], [0x0, 0x3644, 0x0, 0x7, 0xffffffffffffff31, 0xffffffff00000000, 0x73da, 0xeaeb, 0x2, 0xcc, 0x26, 0x5, 0x711d202c, 0x1, 0x2, 0x5, 0x397e, 0x0, 0x4, 0x4, 0xfbd, 0x3, 0x5, 0x0, 0x1, 0x5, 0x3, 0x40, 0x0, 0x7, 0x2, 0x1, 0xffffffffffffff80, 0x1ff, 0x2, 0xcc60, 0x9, 0x6, 0x1ff, 0x81, 0x8, 0x1, 0x6, 0x484, 0x5, 0x7, 0x40, 0x3b4, 0xffffffffffffffff, 0x3, 0x9, 0x3, 0x0, 0x1, 0xffffffff, 0x5, 0xc9, 0x23c6, 0x2551, 0x1, 0x40, 0xff, 0xc1, 0xb], [0x9, 0x100000000, 0x7fff, 0x4, 0x7, 0x7fffffff, 0x3, 0x3, 0xff, 0x2, 0x3, 0x0, 0x40, 0x5, 0x5, 0x6, 0x100000001, 0x1ff, 0x4, 0x4, 0x3, 0x400, 0x1ff, 0xa52f, 0x1f, 0x0, 0xe1, 0x1, 0x7, 0xad, 0x2f990dd1, 0x2, 0x3, 0x4, 0x8001, 0x168eaae7, 0x5, 0x1, 0x0, 0x7, 0x7, 0x4, 0x6, 0xbc3, 0x9, 0x0, 0x0, 0x800, 0x101, 0x845, 0xddd0, 0x10000, 0xbe6f, 0x2, 0x9, 0x3, 0x8, 0xfffffffffffffffe, 0x3, 0xb, 0xffffffffffffff81, 0x1f, 0x0, 0x1f]}, 0x45c) ptrace$getregset(0x4204, r2, 0x2, &(0x7f0000000000)={0x0}) r5 = gettid() tkill(r5, 0x30) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r5, 0x0, 0x0) ptrace$getsig(0x4202, r5, 0x1000, &(0x7f0000000380)) 10:08:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(&(0x7f0000000140)=[{}], 0x1, 0xe6) 10:08:47 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x4000003, 0xc0e) timer_create(0x7, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="025bb2ef021d53375506c1f7b36a4b810594e369f8765e8225ef38f733256ce0ddf25485200a"], 0x26) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000640)={&(0x7f00000003c0), 0xc, &(0x7f0000000600)}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000180), 0x132472) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) dup2(r4, r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r5, &(0x7f0000000080), 0x1c) r6 = dup2(r5, r5) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r6, 0x6, 0x16, &(0x7f0000000180), 0x132472) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000400)="11dca50d5c0bcfe47bf070") r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r8, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r8, &(0x7f0000000080), 0x1c) r9 = dup2(r8, r8) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r9, 0x6, 0x16, &(0x7f0000000180), 0x132472) r10 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r10, 0x1000008912, &(0x7f0000000400)="11dca50d5c0bcfe47bf070") write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000480)=ANY=[], @ANYPTR=&(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16=0x0], @ANYRES64=r3, @ANYPTR64=&(0x7f0000000140)=ANY=[], @ANYRES64=0x0, @ANYRESHEX, @ANYRES64, @ANYRES64, @ANYRESHEX=r1, @ANYRESHEX]], 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x10002) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x10, 0xffffffffffffffff, 0x0) r11 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r11, 0x107, 0x5, 0x0, 0x0) 10:08:47 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x83c7, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) 10:08:47 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:48 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x83c7, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) 10:08:48 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:48 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/protocols\x00') ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') preadv(r2, &(0x7f00000017c0), 0x3cc, 0x91) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x1, 0xfffffffffffffffc}]}, 0xc, 0x0) 10:08:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:48 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:48 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) poll(&(0x7f0000000140)=[{}], 0x1, 0xe6) 10:08:48 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0xfbfffffffffffffe, 0x0, @mcast2}, 0x1c) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x1e6, 0x1000, 0x1}) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r3 = syz_open_dev$binder(0x0, 0x0, 0x800) mmap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x0, 0x10, r3, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) syz_read_part_table(0x2, 0x2, &(0x7f0000000880)=[{&(0x7f0000000180)="a5da0419a3b68da42da8ddc5f021292f959f21a63232e9207580f2e72ada6fc5c169f15030c646b6e94c040476ddf56a8097", 0x32, 0x80000000}, {0x0}]) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) getsockopt$sock_int(r0, 0x1, 0xc, &(0x7f00000002c0), &(0x7f00000008c0)=0x4) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:08:48 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) write$P9_RSTAT(r1, &(0x7f0000000080)={0x61, 0x7d, 0x1, {0x0, 0x5a, 0x80000001, 0x8b, {0x40, 0x3, 0x7}, 0x180000, 0x6, 0x1, 0x10001, 0x20, 'GPLsecuritybdev@;nodevnodevwlan1', 0x0, '', 0x5, 'bdev!', 0x2, '#,'}}, 0x61) set_tid_address(&(0x7f0000000000)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000180), 0x132472) ioctl$TIOCGDEV(r3, 0x80045432, &(0x7f0000000100)) connect(r0, &(0x7f0000000140)=@ethernet={0x6, @broadcast}, 0x80) 10:08:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:48 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:48 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/protocols\x00') ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') preadv(r2, &(0x7f00000017c0), 0x3cc, 0x91) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x1, 0xfffffffffffffffc}]}, 0xc, 0x0) 10:08:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) dup2(r0, r0) r1 = dup(r0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x8) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x81}, {0x80000006}]}, 0x10) r3 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x0, 0x20040011) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r4 = syz_open_procfs(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000000000)={0x7, 0x2, 0x0, 0x0, 0x0, 0x94, 0x80000000, 0x4, 0x0, 0x6}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) 10:08:48 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000140)=[{r0}], 0x1, 0xe6) 10:08:48 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) fcntl$getown(r2, 0x9) r3 = syz_open_procfs(0x0, 0x0) close(0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) r5 = dup2(r4, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000180), 0x132472) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@remote}}, &(0x7f00000003c0)=0xe8) r7 = getgid() r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fstat(r8, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FIDEDUPERANGE(r8, 0xc0189436, &(0x7f0000003fc0)=ANY=[@ANYPTR64=&(0x7f0000003dc0)=ANY=[@ANYRES16=r10], @ANYRESDEC=r8, @ANYRESHEX=r9, @ANYPTR]) write$P9_RSTATu(r5, &(0x7f0000000400)={0x7e, 0x7d, 0x1, {{0x0, 0x64, 0x20, 0x0, {0x80, 0x1, 0x6}, 0x0, 0xadf, 0x3, 0x5, 0xd, 'net/if_inet6\x00', 0xd, 'net/if_inet6\x00', 0xa, '/dev/ptmx\x00', 0xd, 'nodevprocem1@'}, 0x5, 'bdev*', r6, r7, r10}}, 0x7e) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r11 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000200)={0x6, 0x7}) setsockopt$packet_fanout(r11, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x7, 0x8000}, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sched_getparam(0x0, &(0x7f0000000340)) ioctl$FS_IOC_GETVERSION(r11, 0x80087601, &(0x7f0000000180)) r12 = syz_open_procfs(0x0, &(0x7f0000000340)='net/if_inet6\x00') preadv(r12, &(0x7f00000017c0), 0x199, 0x0) ioctl$TIOCCONS(r12, 0x541d) r13 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r13, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast2, 0x0, 0x3c}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) connect$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 10:08:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0xfbfffffffffffffe, 0x0, @mcast2}, 0x1c) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x1e6, 0x1000, 0x1}) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r3 = syz_open_dev$binder(0x0, 0x0, 0x800) mmap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x0, 0x10, r3, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) syz_read_part_table(0x2, 0x2, &(0x7f0000000880)=[{&(0x7f0000000180)="a5da0419a3b68da42da8ddc5f021292f959f21a63232e9207580f2e72ada6fc5c169f15030c646b6e94c040476ddf56a8097", 0x32, 0x80000000}, {0x0}]) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) getsockopt$sock_int(r0, 0x1, 0xc, &(0x7f00000002c0), &(0x7f00000008c0)=0x4) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10:08:48 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, 0x0, 0x0, 0x1efffffd) 10:08:48 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, 0x0, 0x0, 0x1efffffd) 10:08:49 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, 0x0, 0x0, 0x1efffffd) 10:08:49 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10) io_setup(0x1, &(0x7f0000000240)=0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000280)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @local}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000200)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2a, r4}) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x7ffffffff000}]) 10:08:49 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x0) 10:08:49 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x0) [ 90.739982] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 90.883722] syz-executor.5 (3502) used greatest stack depth: 22664 bytes left 10:08:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/protocols\x00') ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') preadv(r2, &(0x7f00000017c0), 0x3cc, 0x91) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x1, 0xfffffffffffffffc}]}, 0xc, 0x0) 10:08:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000140)=[{r0}], 0x1, 0xe6) 10:08:49 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040)="25bca274769e620aa734fa0095e0612687463915e38802a9d8aea872943afd874e2f98b500020000000000000206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='journal_pati=./file00_l_\x00']) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000180), 0x132472) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup(0xffffffffffffffff) setsockopt$inet_mreqsrc(r3, 0x0, 0x0, &(0x7f00000004c0)={@dev={0xac, 0x14, 0x14, 0x12}, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) r4 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/create\x00', 0x2, 0x0) ioctl$FS_IOC_SETVERSION(r4, 0x40087602, &(0x7f0000000480)=0x50) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r5, &(0x7f0000000080), 0x1c) r6 = dup2(r5, r5) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r6, 0x6, 0x16, &(0x7f0000000180), 0x132472) r7 = dup2(r2, r6) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r7, 0x6, 0x16, &(0x7f0000000180), 0x132472) r8 = socket(0x100000000011, 0x2, 0x0) bind(r8, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00'}) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000100)={r9, 0x1, 0x6, @random="2caeab0bb345"}, 0x10) sendmsg$inet(r7, &(0x7f0000000540)={&(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10, &(0x7f00000003c0)=[{&(0x7f00000002c0)="ed6217dd377f7fbfe71567d2a5e7ce0011bc9da964669c9f49f455f420c969b59d0245c38bb60f15ae18fcaf9e4386438812f0c2cff7cb206199f07bac46c3d5fab173ceeb53bc20c5c6ed6e89a9355a984b293baaafd583746783b191c2da80de518f9fa6e188bd0e2648c61f9905a7a373aef87eedfba6736d39dad5b5bde759596205428a80a7509bd1e65e6e9e05cebf323b1e1d33c11e7fd2cbeb068dc41f879045a340b9df5a85d6dde7a789bebacf98d533517ab7f5a29a6e72170e3085bd5e93deb39320ee05b8bf2e4a61440b529f352c6a", 0xd6}], 0x1, &(0x7f0000000400)}, 0x4000480) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000180)={{0xffffffffffffffff, 0x2, 0x7fbd, 0x0, 0x10000}, 0xff, 0x7, 'id0\x00', 'timer0\x00', 0x0, 0x8418, 0x101, 0x4}) 10:08:49 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x0) 10:08:49 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) fcntl$getown(r2, 0x9) r3 = syz_open_procfs(0x0, 0x0) close(0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) r5 = dup2(r4, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000180), 0x132472) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@remote}}, &(0x7f00000003c0)=0xe8) r7 = getgid() r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fstat(r8, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FIDEDUPERANGE(r8, 0xc0189436, &(0x7f0000003fc0)=ANY=[@ANYPTR64=&(0x7f0000003dc0)=ANY=[@ANYRES16=r10], @ANYRESDEC=r8, @ANYRESHEX=r9, @ANYPTR]) write$P9_RSTATu(r5, &(0x7f0000000400)={0x7e, 0x7d, 0x1, {{0x0, 0x64, 0x20, 0x0, {0x80, 0x1, 0x6}, 0x0, 0xadf, 0x3, 0x5, 0xd, 'net/if_inet6\x00', 0xd, 'net/if_inet6\x00', 0xa, '/dev/ptmx\x00', 0xd, 'nodevprocem1@'}, 0x5, 'bdev*', r6, r7, r10}}, 0x7e) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r11 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000200)={0x6, 0x7}) setsockopt$packet_fanout(r11, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x7, 0x8000}, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sched_getparam(0x0, &(0x7f0000000340)) ioctl$FS_IOC_GETVERSION(r11, 0x80087601, &(0x7f0000000180)) r12 = syz_open_procfs(0x0, &(0x7f0000000340)='net/if_inet6\x00') preadv(r12, &(0x7f00000017c0), 0x199, 0x0) ioctl$TIOCCONS(r12, 0x541d) r13 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r13, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast2, 0x0, 0x3c}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) connect$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 10:08:49 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) fcntl$getown(r2, 0x9) r3 = syz_open_procfs(0x0, 0x0) close(0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) r5 = dup2(r4, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000180), 0x132472) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@remote}}, &(0x7f00000003c0)=0xe8) r7 = getgid() r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fstat(r8, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FIDEDUPERANGE(r8, 0xc0189436, &(0x7f0000003fc0)=ANY=[@ANYPTR64=&(0x7f0000003dc0)=ANY=[@ANYRES16=r10], @ANYRESDEC=r8, @ANYRESHEX=r9, @ANYPTR]) write$P9_RSTATu(r5, &(0x7f0000000400)={0x7e, 0x7d, 0x1, {{0x0, 0x64, 0x20, 0x0, {0x80, 0x1, 0x6}, 0x0, 0xadf, 0x3, 0x5, 0xd, 'net/if_inet6\x00', 0xd, 'net/if_inet6\x00', 0xa, '/dev/ptmx\x00', 0xd, 'nodevprocem1@'}, 0x5, 'bdev*', r6, r7, r10}}, 0x7e) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r11 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000200)={0x6, 0x7}) setsockopt$packet_fanout(r11, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x7, 0x8000}, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sched_getparam(0x0, &(0x7f0000000340)) ioctl$FS_IOC_GETVERSION(r11, 0x80087601, &(0x7f0000000180)) r12 = syz_open_procfs(0x0, &(0x7f0000000340)='net/if_inet6\x00') preadv(r12, &(0x7f00000017c0), 0x199, 0x0) ioctl$TIOCCONS(r12, 0x541d) r13 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r13, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast2, 0x0, 0x3c}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) connect$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) [ 91.112639] EXT4-fs (loop1): Unrecognized mount option "journal_pati=./file00_l_" or missing value 10:08:49 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) fcntl$getown(r2, 0x9) r3 = syz_open_procfs(0x0, 0x0) close(0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) r5 = dup2(r4, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000180), 0x132472) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@remote}}, &(0x7f00000003c0)=0xe8) r7 = getgid() r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fstat(r8, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FIDEDUPERANGE(r8, 0xc0189436, &(0x7f0000003fc0)=ANY=[@ANYPTR64=&(0x7f0000003dc0)=ANY=[@ANYRES16=r10], @ANYRESDEC=r8, @ANYRESHEX=r9, @ANYPTR]) write$P9_RSTATu(r5, &(0x7f0000000400)={0x7e, 0x7d, 0x1, {{0x0, 0x64, 0x20, 0x0, {0x80, 0x1, 0x6}, 0x0, 0xadf, 0x3, 0x5, 0xd, 'net/if_inet6\x00', 0xd, 'net/if_inet6\x00', 0xa, '/dev/ptmx\x00', 0xd, 'nodevprocem1@'}, 0x5, 'bdev*', r6, r7, r10}}, 0x7e) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r11 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000200)={0x6, 0x7}) setsockopt$packet_fanout(r11, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x7, 0x8000}, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sched_getparam(0x0, &(0x7f0000000340)) ioctl$FS_IOC_GETVERSION(r11, 0x80087601, &(0x7f0000000180)) r12 = syz_open_procfs(0x0, &(0x7f0000000340)='net/if_inet6\x00') preadv(r12, &(0x7f00000017c0), 0x199, 0x0) ioctl$TIOCCONS(r12, 0x541d) r13 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r13, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast2, 0x0, 0x3c}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) connect$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 10:08:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000140)=[{r0}], 0x1, 0xe6) 10:08:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000140)=[{r0}], 0x1, 0xe6) 10:08:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) fcntl$getown(r2, 0x9) r3 = syz_open_procfs(0x0, 0x0) close(0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) r5 = dup2(r4, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000180), 0x132472) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@remote}}, &(0x7f00000003c0)=0xe8) r7 = getgid() r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fstat(r8, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FIDEDUPERANGE(r8, 0xc0189436, &(0x7f0000003fc0)=ANY=[@ANYPTR64=&(0x7f0000003dc0)=ANY=[@ANYRES16=r10], @ANYRESDEC=r8, @ANYRESHEX=r9, @ANYPTR]) write$P9_RSTATu(r5, &(0x7f0000000400)={0x7e, 0x7d, 0x1, {{0x0, 0x64, 0x20, 0x0, {0x80, 0x1, 0x6}, 0x0, 0xadf, 0x3, 0x5, 0xd, 'net/if_inet6\x00', 0xd, 'net/if_inet6\x00', 0xa, '/dev/ptmx\x00', 0xd, 'nodevprocem1@'}, 0x5, 'bdev*', r6, r7, r10}}, 0x7e) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r11 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000200)={0x6, 0x7}) setsockopt$packet_fanout(r11, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x7, 0x8000}, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sched_getparam(0x0, &(0x7f0000000340)) ioctl$FS_IOC_GETVERSION(r11, 0x80087601, &(0x7f0000000180)) r12 = syz_open_procfs(0x0, &(0x7f0000000340)='net/if_inet6\x00') preadv(r12, &(0x7f00000017c0), 0x199, 0x0) ioctl$TIOCCONS(r12, 0x541d) r13 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r13, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast2, 0x0, 0x3c}, 0x0, @in6=@remote, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) connect$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 10:08:50 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000140)=[{r0}], 0x1, 0xe6) 10:08:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0xaa7980b05929ef1a, 0x4) [ 91.641436] EXT4-fs (loop1): Unrecognized mount option "journal_pati=./file00_l_" or missing value 10:08:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/protocols\x00') ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') preadv(r2, &(0x7f00000017c0), 0x3cc, 0x91) 10:08:50 executing program 4: syz_open_dev$evdev(&(0x7f0000000080)='/dnv/input/ev_nt#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x10000) ioctl$EVIOCSKEYCODE(r0, 0x40084502, 0x0) 10:08:50 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003700)=[{{0x0, 0x18d, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x6) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) dup2(r4, r4) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000040)=0x0) ptrace$setregset(0x4205, r5, 0x1, &(0x7f0000000080)={&(0x7f0000000180)="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", 0x1000}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) preadv(r0, &(0x7f0000002ec0), 0x17c, 0x1efffffd) 10:08:50 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000140)=[{r0}], 0x1, 0xe6) [ 95.052694] ------------[ cut here ]------------ [ 95.057568] WARNING: CPU: 1 PID: 2106 at net/xfrm/xfrm_state.c:2192 xfrm_state_fini+0x2a0/0x340 [ 95.066416] Kernel panic - not syncing: panic_on_warn set ... [ 95.066416] [ 95.073811] CPU: 1 PID: 2106 Comm: kworker/u4:2 Not tainted 4.9.191+ #0 [ 95.080576] Workqueue: netns cleanup_net [ 95.084743] ffff8801a6627900 ffffffff81b67171 0000000000000000 ffffffff82a3b340 [ 95.092745] 00000000ffffffff 0000000000000001 0000000000000009 ffff8801a66279e0 [ 95.100744] ffffffff813ff0ca 0000000041b58ab3 ffffffff82e32ec5 ffffffff813feef1 [ 95.108759] Call Trace: [ 95.111325] [<000000004b198db5>] dump_stack+0xc1/0x120 [ 95.116665] [<00000000e6de5544>] panic+0x1d9/0x3bd [ 95.121744] [<0000000072569a1b>] ? add_taint.cold+0x16/0x16 [ 95.127518] [<00000000ad07b318>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 95.134333] [<00000000b90c4f5d>] ? xfrm_state_flush+0x1e3/0x310 [ 95.140468] [<00000000ebf05ebf>] ? trace_hardirqs_on+0xd/0x10 [ 95.146443] [<00000000eb96218a>] ? __warn.cold+0x14/0x2f [ 95.152036] [<0000000082faac00>] ? xfrm_state_fini+0x2a0/0x340 [ 95.158113] [<00000000c5e8e796>] __warn.cold+0x2f/0x2f [ 95.163462] [<00000000d1bef40a>] warn_slowpath_null+0x2d/0x40 [ 95.169424] [<0000000082faac00>] xfrm_state_fini+0x2a0/0x340 [ 95.175297] [<0000000083f78d33>] xfrm_net_exit+0x2e/0x40 [ 95.180810] [<00000000895cd3ab>] ? xfrm_policy_fini+0x320/0x320 [ 95.186948] [<000000000c95758e>] ops_exit_list.isra.0+0xb0/0x160 [ 95.193154] [<000000007234e10b>] cleanup_net+0x3d6/0x8a0 [ 95.198684] [<00000000143eb5bf>] ? debug_object_deactivate+0x1e4/0x360 [ 95.205418] [<00000000d4d3a077>] ? net_drop_ns+0x80/0x80 [ 95.210937] [<000000008115af22>] process_one_work+0x88b/0x1600 [ 95.216978] [<00000000f84604dd>] ? process_one_work+0x7ce/0x1600 [ 95.223339] [<0000000077d3353a>] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 95.229818] [<00000000e9676faf>] ? _raw_spin_unlock_irq+0x28/0x60 [ 95.236130] [<00000000468b2d57>] worker_thread+0x5df/0x11d0 [ 95.241908] [<0000000068251b20>] ? process_one_work+0x1600/0x1600 [ 95.248203] [<00000000a0d119a0>] kthread+0x278/0x310 [ 95.253371] [<000000001236e011>] ? kthread_park+0xa0/0xa0 [ 95.258983] [<00000000f07fac29>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 95.265798] [<00000000f4fbfdf6>] ? _raw_spin_unlock_irq+0x39/0x60 [ 95.272102] [<00000000708e4344>] ? finish_task_switch+0x1e5/0x660 [ 95.278397] [<0000000020a7fd98>] ? finish_task_switch+0x1b7/0x660 [ 95.284697] [<000000008d57263c>] ? __switch_to_asm+0x41/0x70 [ 95.290569] [<000000005cd67386>] ? __switch_to_asm+0x35/0x70 [ 95.296429] [<000000008d57263c>] ? __switch_to_asm+0x41/0x70 [ 95.302288] [<000000001236e011>] ? kthread_park+0xa0/0xa0 [ 95.307887] [<000000001236e011>] ? kthread_park+0xa0/0xa0 [ 95.313498] [<0000000071f9ce9f>] ret_from_fork+0x5c/0x70 [ 95.319711] Kernel Offset: disabled [ 95.323337] Rebooting in 86400 seconds..