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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0xa}, 0x0) 04:23:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000100)={0x3, 0xdd2, 0x10000, 0x7f, 0x400, 0x800}) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) 04:23:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x10, 0x6}]}, 0x44}}, 0x0) 04:23:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0xe}, 0x0) 04:23:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "2a4c5b10b6eaad098ff7950f0b7152124a223ace0e6b2271fd6856bf1fefa9a3298dd4431b3635f89ef34203a6d9338eb94455abec7d5c9472bb13b5e1ae8812c35ed5cbb1794cd83d804dc87734d0e84adb8703044a0604ae57f4a614a1c9c915dcc373958f4774be2c0a3346818751725029d76ed18b199d01d9876b37862977"}, 0x85) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6f76656d2c00000000001d8fdcf55dadde3626d0cbd12c61f108898387fa1458208bf29d"]) 04:23:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000, 0x40}}, 0x40) 04:23:11 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000000)={0x10002, 0x0, &(0x7f000004d000/0x3000)=nil}) getsockopt$inet_buf(r0, 0x0, 0x0, 0x0, &(0x7f0000695ffc)) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x2) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) syz_open_procfs(r3, &(0x7f0000000040)='net/anycast6\x00') 04:23:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x300, 0x6}]}, 0x44}}, 0x0) 04:23:11 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x136) 04:23:11 executing program 3 (fault-call:0 fault-nth:0): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x40}}, 0x40) 04:23:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0xf}, 0x0) 04:23:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='overridcrockterm,\x00']) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000003c0)={0x30, 0x5, 0x0, {0x0, 0x4, 0x4, 0x8}}, 0x30) sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001200)={0x24, r3, 0xd25, 0x0, 0x0, {{}, {}, {0x8, 0x2, 0x2}}}, 0x24}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r4, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) fdatasync(r4) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000040)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x68, r3, 0x300, 0x70bd26, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0xfffffff0, @media='eth\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x48001}, 0x80) 04:23:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x500, 0x6}]}, 0x44}}, 0x0) 04:23:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x600, 0x6}]}, 0x44}}, 0x0) [ 1390.618572] FAULT_INJECTION: forcing a failure. [ 1390.618572] name failslab, interval 1, probability 0, space 0, times 0 [ 1390.618591] CPU: 1 PID: 31221 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1390.618600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1390.618605] Call Trace: [ 1390.618623] dump_stack+0x188/0x20d [ 1390.618643] should_fail.cold+0xa/0x1b [ 1390.618659] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1390.618680] __should_failslab+0x115/0x180 04:23:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x48}, 0x0) [ 1390.618699] should_failslab+0x5/0xf [ 1390.670246] __kmalloc+0x2d3/0x770 [ 1390.670260] ? __x64_sys_memfd_create+0x131/0x450 [ 1390.670272] ? vfs_write+0x15b/0x550 04:23:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x700, 0x6}]}, 0x44}}, 0x0) [ 1390.670284] ? strnlen_user+0x158/0x1d0 [ 1390.670298] __x64_sys_memfd_create+0x131/0x450 [ 1390.670310] ? memfd_fcntl+0x16b0/0x16b0 [ 1390.670321] ? __ia32_sys_clock_settime+0x260/0x260 04:23:11 executing program 0: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x39, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x0, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f0000000100)={0xa, 0x6, [{0x5, 0x0, 0x2}, {0x5, 0x0, 0xfff}, {0xc00, 0x0, 0x7}, {0x7, 0x0, 0x8}, {0xffffffff, 0x0, 0x56e}, {0x7, 0x0, 0x81}, {0x9, 0x0, 0x7ff}, {0x4, 0x0, 0x4a96}, {0x3, 0x0, 0x8}, {0x9, 0x0, 0x7}]}) r4 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_rdma(0x10, 0x3, 0x14) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000040)='rose0\x00', 0x10) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) [ 1390.670333] ? trace_hardirqs_on_thunk+0x1a/0x1c 04:23:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x900, 0x6}]}, 0x44}}, 0x0) [ 1390.670344] ? trace_hardirqs_off_caller+0x55/0x210 [ 1390.670355] ? do_syscall_64+0x21/0x620 [ 1390.670368] do_syscall_64+0xf9/0x620 04:23:12 executing program 3 (fault-call:0 fault-nth:1): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 1390.670382] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1390.670391] RIP: 0033:0x45c849 [ 1390.670402] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1390.670408] RSP: 002b:00007ff11ffef9d8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1390.670418] RAX: ffffffffffffffda RBX: 00007ff11fff06d4 RCX: 000000000045c849 [ 1390.670424] RDX: 0000000020000518 RSI: 0000000000000000 RDI: 00000000004c1905 [ 1390.670431] RBP: 000000000076bf00 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 1390.670436] R10: 0000000000100003 R11: 0000000000000246 R12: 0000000000000003 [ 1390.670442] R13: 0000000000000c1b R14: 00000000004c1905 R15: 0000000000000000 [ 1390.988200] FAULT_INJECTION: forcing a failure. [ 1390.988200] name failslab, interval 1, probability 0, space 0, times 0 [ 1390.988218] CPU: 0 PID: 31253 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1390.988227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1390.988233] Call Trace: [ 1390.988253] dump_stack+0x188/0x20d [ 1390.988274] should_fail.cold+0xa/0x1b [ 1390.988292] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1390.988317] __should_failslab+0x115/0x180 [ 1390.988332] should_failslab+0x5/0xf [ 1390.988343] kmem_cache_alloc+0x29f/0x710 [ 1390.988356] ? find_held_lock+0x2d/0x110 [ 1390.988370] ? __alloc_fd+0x43c/0x550 [ 1390.988387] ? shmem_destroy_callback+0xb0/0xb0 [ 1390.988402] shmem_alloc_inode+0x18/0x40 [ 1390.988416] ? shmem_destroy_callback+0xb0/0xb0 [ 1390.988429] alloc_inode+0x5d/0x180 [ 1390.988442] new_inode_pseudo+0x14/0xe0 [ 1390.988454] new_inode+0x1b/0x40 [ 1390.988486] shmem_get_inode+0x84/0x780 [ 1390.988509] __shmem_file_setup.part.0+0x7a/0x2b0 [ 1390.988528] shmem_file_setup+0x61/0x90 [ 1390.988560] __x64_sys_memfd_create+0x28a/0x450 [ 1390.988574] ? memfd_fcntl+0x16b0/0x16b0 [ 1390.988590] ? __ia32_sys_clock_settime+0x260/0x260 [ 1390.988605] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1390.988619] ? trace_hardirqs_off_caller+0x55/0x210 [ 1390.988634] ? do_syscall_64+0x21/0x620 [ 1390.988652] do_syscall_64+0xf9/0x620 [ 1390.988668] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1390.988679] RIP: 0033:0x45c849 [ 1390.988693] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1390.988701] RSP: 002b:00007ff11ffef9d8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1390.988715] RAX: ffffffffffffffda RBX: 00007ff11fff06d4 RCX: 000000000045c849 [ 1390.988723] RDX: 0000000020000518 RSI: 0000000000000000 RDI: 00000000004c1905 [ 1390.988731] RBP: 000000000076bf00 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 1390.988739] R10: 0000000000100003 R11: 0000000000000246 R12: 0000000000000003 [ 1390.988746] R13: 0000000000000c1b R14: 00000000004c1905 R15: 0000000000000001 04:23:12 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x137) 04:23:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6f7665727269646504cbb02c7065726d2c00"]) io_setup(0x2, &(0x7f0000000040)) 04:23:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x4c}, 0x0) 04:23:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xa00, 0x6}]}, 0x44}}, 0x0) 04:23:12 executing program 3 (fault-call:0 fault-nth:2): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:12 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x40}}, 0x40) [ 1391.466325] nla_parse: 4 callbacks suppressed [ 1391.466334] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1391.487962] FAULT_INJECTION: forcing a failure. [ 1391.487962] name failslab, interval 1, probability 0, space 0, times 0 [ 1391.533170] CPU: 0 PID: 31272 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1391.541096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1391.550447] Call Trace: [ 1391.553039] dump_stack+0x188/0x20d [ 1391.556662] should_fail.cold+0xa/0x1b [ 1391.560545] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1391.565649] __should_failslab+0x115/0x180 [ 1391.569878] should_failslab+0x5/0xf [ 1391.573581] kmem_cache_alloc+0x29f/0x710 [ 1391.577718] ? __put_user_ns+0x60/0x60 [ 1391.581636] selinux_inode_alloc_security+0xb1/0x2a0 [ 1391.586752] security_inode_alloc+0x83/0xd0 [ 1391.591091] inode_init_always+0x569/0xb40 [ 1391.595344] alloc_inode+0x7a/0x180 [ 1391.598988] new_inode_pseudo+0x14/0xe0 [ 1391.602958] new_inode+0x1b/0x40 [ 1391.606324] shmem_get_inode+0x84/0x780 [ 1391.610296] __shmem_file_setup.part.0+0x7a/0x2b0 [ 1391.615137] shmem_file_setup+0x61/0x90 [ 1391.619103] __x64_sys_memfd_create+0x28a/0x450 [ 1391.623768] ? memfd_fcntl+0x16b0/0x16b0 [ 1391.627910] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1391.632656] ? trace_hardirqs_off_caller+0x55/0x210 [ 1391.637671] ? do_syscall_64+0x21/0x620 [ 1391.641637] do_syscall_64+0xf9/0x620 [ 1391.645431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1391.650617] RIP: 0033:0x45c849 [ 1391.653798] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1391.672705] RSP: 002b:00007ff11ffef9d8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 04:23:12 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x40}}, 0x40) 04:23:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xb00, 0x6}]}, 0x44}}, 0x0) [ 1391.680429] RAX: ffffffffffffffda RBX: 00007ff11fff06d4 RCX: 000000000045c849 [ 1391.687690] RDX: 0000000020000518 RSI: 0000000000000000 RDI: 00000000004c1905 [ 1391.695069] RBP: 000000000076bf00 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 1391.702334] R10: 0000000000100003 R11: 0000000000000246 R12: 0000000000000003 [ 1391.709613] R13: 0000000000000c1b R14: 00000000004c1905 R15: 0000000000000002 04:23:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x60}, 0x0) 04:23:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000040)) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) 04:23:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xc00, 0x6}]}, 0x44}}, 0x0) 04:23:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000, 0x40}}, 0x40) [ 1391.860806] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:13 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x138) 04:23:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000100)='./file1\x00', 0x3f3, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) 04:23:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x68}, 0x0) 04:23:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xd00, 0x6}]}, 0x44}}, 0x0) 04:23:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000, 0x40}}, 0x40) 04:23:13 executing program 3 (fault-call:0 fault-nth:3): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xe00, 0x6}]}, 0x44}}, 0x0) [ 1392.333811] FAULT_INJECTION: forcing a failure. [ 1392.333811] name failslab, interval 1, probability 0, space 0, times 0 [ 1392.357432] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1392.398902] CPU: 0 PID: 31316 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1392.406856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1392.416233] Call Trace: [ 1392.418847] dump_stack+0x188/0x20d [ 1392.422503] should_fail.cold+0xa/0x1b [ 1392.426416] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1392.431552] __should_failslab+0x115/0x180 [ 1392.435819] should_failslab+0x5/0xf [ 1392.439544] kmem_cache_alloc+0x29f/0x710 [ 1392.443713] ? timespec64_trunc+0xf0/0x180 [ 1392.447966] ? inode_init_owner+0x330/0x330 [ 1392.452307] __d_alloc+0x2b/0x9e0 [ 1392.455789] d_alloc_pseudo+0x19/0x70 [ 1392.459594] alloc_file_pseudo+0xc6/0x250 [ 1392.463738] ? check_preemption_disabled+0x41/0x280 [ 1392.468744] ? alloc_file+0x4d0/0x4d0 [ 1392.472535] ? lockdep_annotate_inode_mutex_key+0x3c/0x70 [ 1392.478258] ? shmem_get_inode+0x433/0x780 [ 1392.482487] __shmem_file_setup.part.0+0x102/0x2b0 [ 1392.487407] shmem_file_setup+0x61/0x90 [ 1392.491374] __x64_sys_memfd_create+0x28a/0x450 [ 1392.496299] ? memfd_fcntl+0x16b0/0x16b0 [ 1392.500351] ? __ia32_sys_clock_settime+0x260/0x260 [ 1392.505355] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1392.510108] ? trace_hardirqs_off_caller+0x55/0x210 [ 1392.515112] ? do_syscall_64+0x21/0x620 [ 1392.519086] do_syscall_64+0xf9/0x620 [ 1392.522877] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1392.528151] RIP: 0033:0x45c849 04:23:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x40}}, 0x40) [ 1392.531338] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1392.550230] RSP: 002b:00007ff11ffef9d8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1392.557927] RAX: ffffffffffffffda RBX: 00007ff11fff06d4 RCX: 000000000045c849 [ 1392.565183] RDX: 0000000020000518 RSI: 0000000000000000 RDI: 00000000004c1905 [ 1392.572477] RBP: 000000000076bf00 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 1392.579747] R10: 0000000000100003 R11: 0000000000000246 R12: 0000000000000003 [ 1392.587021] R13: 0000000000000c1b R14: 00000000004c1905 R15: 0000000000000003 04:23:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000240)="db40951195b6532950", 0x9) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r3, r4, r3}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000440)={r3, 0xbe, 0x6a}, 0x0, &(0x7f0000000480)="e449a7dd9ac172bcdee00f1b72baa86567524794655ddc1be4e65fcbda294873dca9526adbda4bd79445a04754fbf2769cf7765a99ddf50dbf5de3d6e80dd89577e90319fba9d3ff64098b1d76121bf387565ada277810168ada6fbcbe1446daea273eb3853e09ce724407d47da773163c999783b3545430422ee54244d039dd723983b10d6590d06b0fdcfc9968a97eabae519861ffc699cbd5934fdb58246be87a3f14dcc0146fa702cf3168f44a6853cc983fdc44a8af3db8df86fdb7", &(0x7f0000000540)=""/106) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f00000001c0)={0x0, 0x9ba4, 0x2, 0x2, &(0x7f0000ffa000/0x4000)=nil, 0x5}) r5 = getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000300)={0xa5, 0x7d, 0x2, {{0x0, 0x90, 0x0, 0x0, {0x0, 0x1, 0x2}, 0x20090000, 0x1, 0x8, 0x80, 0x9, 'ip6_vti0\x00', 0x12, 'securitywlan0self)', 0x21, 'system_u:object_r:hald_exec_t:s0\x00', 0x21, 'system_u:object_r:hald_exec_t:s0\x00'}, 0x0, '', 0x0, r2, r5}}, 0xa5) r6 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) r8 = getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB="a50000007d020000009000000000000000000f00000002000000000000000000092001000000080032a4bf767469300012007365637572697479776c616e3073656c6629210073797374656d5f753a6f626a6563885f723a68616c645f65656d5f753a6f626a6563745f723a68616c645f6d7865635f743a733000000000000000000000000000000000000000000000000000000000000000008bf91366", @ANYRES32=0x0, @ANYRES32=r7, @ANYRES32=r8], 0xa5) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000240)={0xa5, 0x7d, 0x2, {{0x0, 0x90, 0x403, 0x0, {0x0, 0x1, 0x2}, 0x20090000, 0x1, 0x8, 0x80, 0x9, 'ip6_\x00\x00\x00\x00\x00', 0x12, 'securitywlan0self)', 0x21, 'system_u:object_r:hald_exec_t:s0\x00', 0x21, 'system_u:object_r:hald_exec_t:s0\x00'}, 0x0, '', 0x0, r7, r6}}, 0xa5) mmap$snddsp_status(&(0x7f0000ff9000/0x3000)=nil, 0x1000, 0x400000c, 0x30, 0xffffffffffffffff, 0x82000000) fstat(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@overriderock='overriderockperm'}], [{@obj_type={'obj_type', 0x3d, 'iso9660\x00'}}, {@appraise='appraise'}, {@euid_gt={'euid>', r9}}, {@fowner_eq={'fowner'}}, {@subj_user={'subj_user', 0x3d, 'system_u:object_r:hald_exec_t:s0\x00'}}, {@euid_lt={'euid<', r6}}]}) 04:23:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x6c}, 0x0) 04:23:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000, 0x40}}, 0x40) 04:23:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xf00, 0x6}]}, 0x44}}, 0x0) [ 1392.834552] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:14 executing program 3 (fault-call:0 fault-nth:4): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) 04:23:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000, 0x40}}, 0x40) 04:23:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1100, 0x6}]}, 0x44}}, 0x0) 04:23:14 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x139) 04:23:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x74}, 0x0) 04:23:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1200, 0x6}]}, 0x44}}, 0x0) 04:23:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0x40}}, 0x40) [ 1393.261715] FAULT_INJECTION: forcing a failure. [ 1393.261715] name failslab, interval 1, probability 0, space 0, times 0 [ 1393.299956] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1393.306891] CPU: 1 PID: 31368 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1393.316375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1393.325737] Call Trace: [ 1393.328332] dump_stack+0x188/0x20d [ 1393.331957] should_fail.cold+0xa/0x1b [ 1393.335839] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1393.340942] __should_failslab+0x115/0x180 [ 1393.345166] should_failslab+0x5/0xf [ 1393.348876] kmem_cache_alloc+0x29f/0x710 [ 1393.353023] ? d_instantiate+0x75/0x90 [ 1393.356906] __alloc_file+0x21/0x330 [ 1393.360614] alloc_empty_file+0x6d/0x170 [ 1393.364664] alloc_file+0x5e/0x4d0 [ 1393.368632] alloc_file_pseudo+0x165/0x250 [ 1393.372861] ? alloc_file+0x4d0/0x4d0 [ 1393.376673] ? shmem_get_inode+0x433/0x780 [ 1393.380914] __shmem_file_setup.part.0+0x102/0x2b0 [ 1393.385841] shmem_file_setup+0x61/0x90 [ 1393.389813] __x64_sys_memfd_create+0x28a/0x450 [ 1393.394476] ? memfd_fcntl+0x16b0/0x16b0 [ 1393.398528] ? __ia32_sys_clock_settime+0x260/0x260 [ 1393.403539] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1393.408285] ? trace_hardirqs_off_caller+0x55/0x210 [ 1393.413290] ? do_syscall_64+0x21/0x620 [ 1393.417259] do_syscall_64+0xf9/0x620 [ 1393.421411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1393.426590] RIP: 0033:0x45c849 [ 1393.429778] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1393.448680] RSP: 002b:00007ff11ffef9d8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 04:23:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f00000002c0)={0xa4, 0x0, 0x6, 0x4, &(0x7f0000000240)}) sendto$x25(0xffffffffffffffff, &(0x7f0000000100)="9fae2770cdb18c8382405b39062a52c2f435fe26ab50dfef45761ef250a62c44d66b2968528497160e445d99fab89377754d413c575d21deada2b60ec628e752f331f253b19553a8d41c1182d7046e93ccdae383100b3bfb448adc9f2c66ede228debf908fe500e0d898caf334c7a11b53d37e4693d969ffaf70dba7bfc94f6cc8f52882230fb30af85b6f06380d2be851371ee74bbfc06271b6f59b23c9ee7a9a35cdab46bf0c14fa4259517058a3c43ce1e838214e989e752dd5c9ff4b759bfc", 0xc1, 0x20000801, &(0x7f0000000040)={0x9, @null=' \x00'}, 0x12) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) [ 1393.456376] RAX: ffffffffffffffda RBX: 00007ff11fff06d4 RCX: 000000000045c849 [ 1393.463640] RDX: 0000000020000518 RSI: 0000000000000000 RDI: 00000000004c1905 [ 1393.470919] RBP: 000000000076bf00 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 1393.478214] R10: 0000000000100003 R11: 0000000000000246 R12: 0000000000000003 [ 1393.485493] R13: 0000000000000c1b R14: 00000000004c1905 R15: 0000000000000004 04:23:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x7a}, 0x0) 04:23:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000, 0x40}}, 0x40) 04:23:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1300, 0x6}]}, 0x44}}, 0x0) 04:23:14 executing program 3 (fault-call:0 fault-nth:5): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x90040, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000017c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001a80)={0x20, r4, 0x4e559e2353b8c5d5, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0x1d0, r4, 0x300, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x8c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}]}, @TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x4f}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3ff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100}]}, @TIPC_NLA_NODE={0x30, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x1c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK={0x1c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_LINK={0x34, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}]}]}, @TIPC_NLA_NET={0x28, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x10001}]}, @TIPC_NLA_NODE={0x20, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xc261}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_LINK={0x34, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x4000}, 0x40) 04:23:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a000000, 0x40}}, 0x40) 04:23:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1400, 0x6}]}, 0x44}}, 0x0) [ 1393.766418] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1393.885159] FAULT_INJECTION: forcing a failure. [ 1393.885159] name failslab, interval 1, probability 0, space 0, times 0 [ 1393.910244] CPU: 0 PID: 31413 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1393.918176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1393.927547] Call Trace: [ 1393.930176] dump_stack+0x188/0x20d [ 1393.933832] should_fail.cold+0xa/0x1b [ 1393.937748] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1393.942890] __should_failslab+0x115/0x180 [ 1393.947140] should_failslab+0x5/0xf [ 1393.950862] kmem_cache_alloc+0x29f/0x710 [ 1393.955022] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1393.960059] selinux_file_alloc_security+0xaf/0x190 [ 1393.965085] security_file_alloc+0x5c/0xa0 [ 1393.969340] __alloc_file+0xc9/0x330 [ 1393.973078] alloc_empty_file+0x6d/0x170 [ 1393.977159] alloc_file+0x5e/0x4d0 [ 1393.980826] alloc_file_pseudo+0x165/0x250 [ 1393.985080] ? alloc_file+0x4d0/0x4d0 [ 1393.988921] ? shmem_get_inode+0x433/0x780 [ 1393.993176] __shmem_file_setup.part.0+0x102/0x2b0 [ 1393.998123] shmem_file_setup+0x61/0x90 [ 1394.002132] __x64_sys_memfd_create+0x28a/0x450 [ 1394.006811] ? memfd_fcntl+0x16b0/0x16b0 [ 1394.010880] ? __ia32_sys_clock_settime+0x260/0x260 [ 1394.015912] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1394.020673] ? trace_hardirqs_off_caller+0x55/0x210 [ 1394.025706] ? do_syscall_64+0x21/0x620 [ 1394.029699] do_syscall_64+0xf9/0x620 [ 1394.033519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1394.038714] RIP: 0033:0x45c849 [ 1394.041913] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1394.065686] RSP: 002b:00007ff11ffef9d8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1394.073412] RAX: ffffffffffffffda RBX: 00007ff11fff06d4 RCX: 000000000045c849 04:23:15 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x13a) 04:23:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) io_setup(0x5, &(0x7f0000000040)) 04:23:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1500, 0x6}]}, 0x44}}, 0x0) 04:23:15 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b000000, 0x40}}, 0x40) 04:23:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0xf0}, 0x0) [ 1394.080710] RDX: 0000000020000518 RSI: 0000000000000000 RDI: 00000000004c1905 [ 1394.088156] RBP: 000000000076bf00 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 1394.095435] R10: 0000000000100003 R11: 0000000000000246 R12: 0000000000000003 [ 1394.102716] R13: 0000000000000c1b R14: 00000000004c1905 R15: 0000000000000005 04:23:15 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e000000, 0x40}}, 0x40) 04:23:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1600, 0x6}]}, 0x44}}, 0x0) [ 1394.228181] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6(0xa, 0x80801, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x3d, 0x0, &(0x7f00000004c0)) r2 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r2, 0x113, 0x1, &(0x7f0000000040), 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x2, 0x10, 0x0, 0x2}, &(0x7f0000000340)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000380)={r3, @in={{0x2, 0x4e22, @multicast2}}, 0x8, 0x2}, 0x90) r4 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x200000) ioctl$TIOCGPTLCK(r4, 0x80045439, &(0x7f0000000100)) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x208c1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r6, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) r7 = fcntl$dupfd(r0, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000811000000000020000004b3420d925c769968cc86a5077250393fd4194e284da8555d93b6bdd62355b4afb1aa2f62607"]) ioctl$EVIOCGABS2F(r5, 0x8018456f, &(0x7f0000000240)=""/249) 04:23:15 executing program 3 (fault-call:0 fault-nth:6): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x300}, 0x0) 04:23:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1700, 0x6}]}, 0x44}}, 0x0) 04:23:15 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f000000, 0x40}}, 0x40) [ 1394.506705] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1394.536863] FAULT_INJECTION: forcing a failure. [ 1394.536863] name failslab, interval 1, probability 0, space 0, times 0 [ 1394.563250] CPU: 0 PID: 31464 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1394.571192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1394.582295] Call Trace: [ 1394.584893] dump_stack+0x188/0x20d [ 1394.588519] should_fail.cold+0xa/0x1b [ 1394.592402] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1394.597676] __should_failslab+0x115/0x180 [ 1394.601901] should_failslab+0x5/0xf [ 1394.605690] kmem_cache_alloc+0x29f/0x710 [ 1394.609831] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1394.614844] selinux_file_alloc_security+0xaf/0x190 [ 1394.619852] security_file_alloc+0x5c/0xa0 [ 1394.624086] __alloc_file+0xc9/0x330 [ 1394.627801] alloc_empty_file+0x6d/0x170 [ 1394.631852] alloc_file+0x5e/0x4d0 [ 1394.635383] alloc_file_pseudo+0x165/0x250 [ 1394.639607] ? alloc_file+0x4d0/0x4d0 [ 1394.643407] ? shmem_get_inode+0x433/0x780 [ 1394.647636] __shmem_file_setup.part.0+0x102/0x2b0 [ 1394.652571] shmem_file_setup+0x61/0x90 [ 1394.656537] __x64_sys_memfd_create+0x28a/0x450 [ 1394.661196] ? memfd_fcntl+0x16b0/0x16b0 [ 1394.665245] ? __ia32_sys_clock_settime+0x260/0x260 [ 1394.670252] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1394.674999] ? trace_hardirqs_off_caller+0x55/0x210 [ 1394.680008] ? do_syscall_64+0x21/0x620 [ 1394.684118] do_syscall_64+0xf9/0x620 [ 1394.687919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1394.693097] RIP: 0033:0x45c849 [ 1394.696279] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1394.715179] RSP: 002b:00007ff11ffef9d8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1394.722895] RAX: ffffffffffffffda RBX: 00007ff11fff06d4 RCX: 000000000045c849 [ 1394.730165] RDX: 0000000020000518 RSI: 0000000000000000 RDI: 00000000004c1905 [ 1394.737455] RBP: 000000000076bf00 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 1394.744722] R10: 0000000000100003 R11: 0000000000000246 R12: 0000000000000003 [ 1394.751982] R13: 0000000000000c1b R14: 00000000004c1905 R15: 0000000000000006 04:23:16 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x13b) 04:23:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1800, 0x6}]}, 0x44}}, 0x0) 04:23:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000000)=ANY=[@ANYBLOB="6f76ff0772036465726f636b7049230c2e9f"]) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'bond_slave_0\x00', 0x200}) 04:23:16 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f000000, 0x40}}, 0x40) 04:23:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x500}, 0x0) 04:23:16 executing program 3 (fault-call:0 fault-nth:7): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1900, 0x6}]}, 0x44}}, 0x0) [ 1395.126144] FAULT_INJECTION: forcing a failure. [ 1395.126144] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1395.138069] CPU: 0 PID: 31489 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1395.140006] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1395.146999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1395.147005] Call Trace: [ 1395.147031] dump_stack+0x188/0x20d [ 1395.147056] should_fail.cold+0xa/0x1b [ 1395.175002] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1395.180217] ? mark_held_locks+0xf0/0xf0 [ 1395.184295] ? lock_downgrade+0x740/0x740 [ 1395.188465] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1395.193160] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1395.198189] ? up_write+0x18/0x150 [ 1395.201749] ? fs_reclaim_acquire+0x10/0x10 [ 1395.206095] ? should_fail+0x142/0x7bc [ 1395.210002] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1395.215121] cache_grow_begin+0x8e/0x8a0 [ 1395.219204] kmem_cache_alloc+0x648/0x710 04:23:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x600}, 0x0) [ 1395.223389] ? lock_downgrade+0x740/0x740 [ 1395.227566] getname_flags+0xd2/0x5b0 [ 1395.231390] do_sys_open+0x294/0x500 [ 1395.235295] ? filp_open+0x70/0x70 [ 1395.238850] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1395.243619] ? trace_hardirqs_off_caller+0x55/0x210 [ 1395.248647] ? do_syscall_64+0x21/0x620 [ 1395.252637] do_syscall_64+0xf9/0x620 [ 1395.256458] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1395.261661] RIP: 0033:0x4165e1 04:23:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1a00, 0x6}]}, 0x44}}, 0x0) [ 1395.264881] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1395.283924] RSP: 002b:00007ff11ffef9d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1395.291651] RAX: ffffffffffffffda RBX: 00007ff11fff06d4 RCX: 00000000004165e1 [ 1395.298936] RDX: 00007ff11ffefbba RSI: 0000000000000002 RDI: 00007ff11ffefbb0 [ 1395.306223] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1395.309079] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x40, 0x0) ioctl$SNDRV_PCM_IOCTL_DROP(r2, 0x4143, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r3, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x7fffffff, 0x0, 0x0, 0x80001, &(0x7f0000000180)=ANY=[@ANYBLOB="4f76651ea75ed0b73eeae1c397599f3987f12638e3e8e236d30b7877b471c4700501fd8ee7f5b39aa39a5159745cbdfdb4ec851b4d95b500e8ffffff00"/70, @ANYPTR=&(0x7f0000000000)=ANY=[@ANYRESHEX=r3]]) fstatfs(r0, &(0x7f0000000100)=""/58) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r4, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f0000000140), &(0x7f0000000240)=0xc) 04:23:16 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff, 0x40}}, 0x40) [ 1395.313521] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 1395.313530] R13: 0000000000000c1b R14: 00000000004c1905 R15: 0000000000000007 04:23:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x700}, 0x0) 04:23:17 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x13c) 04:23:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1b00, 0x6}]}, 0x44}}, 0x0) 04:23:17 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b000000, 0x40}}, 0x40) 04:23:17 executing program 3 (fault-call:0 fault-nth:8): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 1396.046435] FAULT_INJECTION: forcing a failure. [ 1396.046435] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1396.058295] CPU: 1 PID: 31536 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1396.066376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1396.077915] Call Trace: [ 1396.080527] dump_stack+0x188/0x20d [ 1396.084177] should_fail.cold+0xa/0x1b [ 1396.088087] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1396.093209] ? mark_held_locks+0xf0/0xf0 [ 1396.097263] ? lock_downgrade+0x740/0x740 [ 1396.101405] __alloc_pages_nodemask+0x1c7/0x6a0 [ 1396.106067] ? __alloc_pages_slowpath+0x26a0/0x26a0 [ 1396.111079] ? up_write+0x18/0x150 [ 1396.114799] ? fs_reclaim_acquire+0x10/0x10 [ 1396.119119] ? should_fail+0x142/0x7bc [ 1396.123020] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1396.128215] cache_grow_begin+0x8e/0x8a0 [ 1396.132279] kmem_cache_alloc+0x648/0x710 [ 1396.136423] ? lock_downgrade+0x740/0x740 [ 1396.140585] getname_flags+0xd2/0x5b0 [ 1396.144389] do_sys_open+0x294/0x500 [ 1396.148099] ? filp_open+0x70/0x70 [ 1396.151637] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1396.156384] ? trace_hardirqs_off_caller+0x55/0x210 [ 1396.161396] ? do_syscall_64+0x21/0x620 [ 1396.165363] do_syscall_64+0xf9/0x620 [ 1396.169158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1396.174338] RIP: 0033:0x4165e1 [ 1396.177527] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 04:23:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0xa00}, 0x0) 04:23:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000240)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_NMI(r4, 0xae9a) r5 = socket(0x80000000000000a, 0x2, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="800000087f90caf34854a65378ee2779aa771f7015fe24bd52cfa0f50ae1a712d6392649487ffb21abd56e6ddb7487b4a6c45b85bf0ada187139e14f762d32d7605bef9be6b91dd9e2f46ebdc653225a3e010a028bea53d7cc31de908d1e75e9f81621f4fde8bf6e0434d435629a9ce926", @ANYRES16=0x0, @ANYBLOB="000829bd7000fddbdf25110000002400028008000500050000000800080001000080051f0d0001000000060002004e2000000800060008000000080004000200000038000380080001000100000014e602007767310000000000000000000000060007004e20000008000500ac1414aa06000400000000000000da0911c9ab1653cc5fa042934850d92412cf2a19507eaab23f86aeeebe1369a972a30de294d3dd5cd19815f75035c98a2d5d297edc8f68825af32211d191be0377c999705e8e4fa5f3a3337db42f39c433742a38750e7552ab59a03c8c8d20"], 0x80}, 0x1, 0x0, 0x0, 0x800}, 0x40c0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000140)={r7, 0x7f}, 0x8) ioctl$KVM_ASSIGN_DEV_IRQ(r3, 0x4040ae70, &(0x7f0000000300)={0x100, 0x8001, 0x0, 0x402}) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891b, &(0x7f0000000100)={'ip6gretap0\x00', {0x2, 0x4e24, @broadcast}}) [ 1396.196521] RSP: 002b:00007ff11ffef9d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1396.204224] RAX: ffffffffffffffda RBX: 00007ff11fff06d4 RCX: 00000000004165e1 [ 1396.211479] RDX: 00007ff11ffefbba RSI: 0000000000000002 RDI: 00007ff11ffefbb0 [ 1396.218734] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1396.225988] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 1396.233244] R13: 0000000000000c1b R14: 00000000004c1905 R15: 0000000000000008 04:23:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1c00, 0x6}]}, 0x44}}, 0x0) 04:23:17 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80, 0x40}}, 0x40) 04:23:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0xe00}, 0x0) 04:23:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1d00, 0x6}]}, 0x44}}, 0x0) [ 1396.503645] nla_parse: 3 callbacks suppressed [ 1396.503653] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:17 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0000000000000, 0x40}}, 0x40) 04:23:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1e00, 0x6}]}, 0x44}}, 0x0) 04:23:18 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x13d) 04:23:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0xf00}, 0x0) 04:23:18 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x40}}, 0x40) 04:23:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1f00, 0x6}]}, 0x44}}, 0x0) 04:23:18 executing program 3 (fault-call:0 fault-nth:9): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:18 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x180000000000000, 0x40}}, 0x40) [ 1396.970633] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x2000, 0x6}]}, 0x44}}, 0x0) 04:23:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6f76657272696465726f6b7065726d2c00c97d46de38b95d9d1d77c5da12f5edbdc2375e0737023bc2f3d96804bbf1205faf36d038145730df3a2d581334d25705967ac5ab7aa67bec562860748697f4d1eb751241ac8c559b65dd4153ac050f0c1f7a182f9fc725c7d474"]) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x10000, 0x0) r3 = socket(0x80000000000000a, 0x2, 0x0) close(r3) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x2) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r4, 0x0, 0x0) ioprio_get$pid(0x2, r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$bt_hci(r1, 0x0, 0x2, &(0x7f0000000240)=""/195, &(0x7f00000001c0)=0xc3) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000340)=ANY=[@ANYBLOB="2aee2a6adec05c8e85617ba2187be74ae82cc269fcedd77384b5cedddd996bfed31d1f9bdbc24e6a6f5d7f1bde90a0f6c6eb156f50dba9d2b695aba466d8f514a451658dd35888ff631ac6eebb8a206085da227fc750ffa5d26f1ac0a62d6f77f0e2ad1224b4cabf5f44e106eea8e767564c4cdefcce2f8296157b97a1249a95095da0dbfcb18f31e46a475c3b24af90fdc44fbafca0c2b6201a868b554e73edba4b645a3f00d355af1fde0176d1516cbf79eddb579b054c9ce874fe512a5fb417db3d523bb24dce52ccdbaa679d25a8bfd04249b9", @ANYRES32=0x0], &(0x7f000095dffc)=0x2) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000000)={r6}, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x80, 0x5fb, 0x0, 0x20, 0x9, 0x4, 0xffff, 0x9, r6}, &(0x7f0000000180)=0x20) 04:23:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x1621}, 0x0) 04:23:18 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x40}}, 0x40) [ 1397.142819] FAULT_INJECTION: forcing a failure. [ 1397.142819] name failslab, interval 1, probability 0, space 0, times 0 04:23:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="510b000000000000726f636b7065726d2c0096dfbcb397ceacb47ea2e776403eb32f39537e576eba601b0045be8367026b73705e5bf46a255b654de800e5ac140cd4d6ec097545f4cd436593cfdf06fa35f36db5"]) 04:23:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x2100, 0x6}]}, 0x44}}, 0x0) [ 1397.206341] CPU: 0 PID: 31594 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1397.214280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1397.223644] Call Trace: [ 1397.226249] dump_stack+0x188/0x20d [ 1397.229901] should_fail.cold+0xa/0x1b [ 1397.233810] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1397.238940] __should_failslab+0x115/0x180 [ 1397.239279] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1397.243214] should_failslab+0x5/0xf [ 1397.243227] kmem_cache_alloc+0x29f/0x710 [ 1397.243247] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1397.264684] selinux_file_alloc_security+0xaf/0x190 [ 1397.269721] security_file_alloc+0x5c/0xa0 [ 1397.273978] __alloc_file+0xc9/0x330 [ 1397.277706] alloc_empty_file+0x6d/0x170 [ 1397.281785] path_openat+0xf2/0x4200 [ 1397.285525] ? __lock_acquire+0x6ee/0x49c0 [ 1397.289772] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1397.295152] ? mark_held_locks+0xf0/0xf0 [ 1397.299229] ? __isolate_free_page+0x4c0/0x4c0 [ 1397.303835] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1397.308526] ? __lock_is_held+0xad/0x140 [ 1397.312612] do_filp_open+0x1a1/0x280 [ 1397.316431] ? may_open_dev+0xf0/0xf0 [ 1397.320252] ? find_held_lock+0x2d/0x110 [ 1397.320269] ? __alloc_fd+0x43c/0x550 [ 1397.320289] ? lock_downgrade+0x740/0x740 [ 1397.320303] ? __lock_is_held+0xad/0x140 [ 1397.320321] ? do_raw_spin_unlock+0x171/0x260 [ 1397.320336] ? _raw_spin_unlock+0x29/0x40 [ 1397.320349] ? __alloc_fd+0x43c/0x550 [ 1397.320370] do_sys_open+0x3c0/0x500 [ 1397.320386] ? filp_open+0x70/0x70 [ 1397.320405] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1397.320420] ? trace_hardirqs_off_caller+0x55/0x210 [ 1397.320436] ? do_syscall_64+0x21/0x620 [ 1397.320453] do_syscall_64+0xf9/0x620 [ 1397.320470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1397.320482] RIP: 0033:0x4165e1 [ 1397.320497] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1397.320505] RSP: 002b:00007ff11ffef9d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1397.320519] RAX: ffffffffffffffda RBX: 00007ff11fff06d4 RCX: 00000000004165e1 [ 1397.320528] RDX: 00007ff11ffefbba RSI: 0000000000000002 RDI: 00007ff11ffefbb0 [ 1397.320536] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1397.320544] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 1397.320552] R13: 0000000000000c1b R14: 00000000004c1905 R15: 0000000000000009 04:23:18 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x13e) 04:23:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6f76657272696465726f636b70655a402c00866160d55e3b066c8877d68f440680b5d5af4eafdc52d7f5f9403413d4b16ae5bf66aeb86be5a9c906fb1ec41c3339c38fba18f97e21782b7829c8de0e016fbca2a7effc92ea6e9bf90a6ee3988ee32dd8f56280d8020a2596fbc0e0f8108b777d1c93813d2639e0b9fee92589e332a43afd14447a6ee1a9b2b5d0a6c8"]) 04:23:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x2200, 0x6}]}, 0x44}}, 0x0) 04:23:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x2000}, 0x0) 04:23:18 executing program 3 (fault-call:0 fault-nth:10): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:18 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000, 0x40}}, 0x40) 04:23:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x2300, 0x6}]}, 0x44}}, 0x0) [ 1397.888326] FAULT_INJECTION: forcing a failure. [ 1397.888326] name failslab, interval 1, probability 0, space 0, times 0 [ 1397.902270] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1397.925639] CPU: 0 PID: 31646 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 04:23:19 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x40}}, 0x40) 04:23:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x2116}, 0x0) [ 1397.933569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1397.943065] Call Trace: [ 1397.945678] dump_stack+0x188/0x20d [ 1397.949336] should_fail.cold+0xa/0x1b [ 1397.953248] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1397.958491] ? __lock_is_held+0xad/0x140 [ 1397.962617] __should_failslab+0x115/0x180 [ 1397.966870] should_failslab+0x5/0xf [ 1397.970587] kmem_cache_alloc+0x29f/0x710 [ 1397.974748] ? mark_held_locks+0xf0/0xf0 [ 1397.978808] __kernfs_new_node+0xd2/0x680 [ 1397.982959] ? kernfs_dop_revalidate+0x3b0/0x3b0 [ 1397.987706] ? find_held_lock+0x2d/0x110 [ 1397.991759] ? update_curr+0x3b9/0x870 [ 1397.995651] ? mark_held_locks+0xf0/0xf0 [ 1397.999709] kernfs_new_node+0x92/0x120 [ 1398.003764] kernfs_create_dir_ns+0x48/0x150 [ 1398.008183] internal_create_group+0x1bf/0xb90 [ 1398.012754] ? find_held_lock+0x2d/0x110 [ 1398.016890] ? lo_ioctl+0xf54/0x20e0 [ 1398.020606] ? lock_acquire+0x170/0x400 [ 1398.024593] ? remove_files.isra.0+0x190/0x190 [ 1398.029171] ? lock_downgrade+0x740/0x740 [ 1398.033331] lo_ioctl+0xf89/0x20e0 [ 1398.036932] ? lo_rw_aio+0x12f0/0x12f0 [ 1398.040917] blkdev_ioctl+0xbf7/0x1a1c [ 1398.044806] ? blkpg_ioctl+0x9e0/0x9e0 [ 1398.048689] ? mark_held_locks+0xf0/0xf0 [ 1398.052743] ? find_held_lock+0x2d/0x110 [ 1398.056797] ? debug_check_no_obj_freed+0x20a/0x42e [ 1398.061809] block_ioctl+0xe9/0x130 [ 1398.065422] ? blkdev_fallocate+0x3f0/0x3f0 [ 1398.069732] do_vfs_ioctl+0xcda/0x12e0 [ 1398.073609] ? selinux_file_ioctl+0x46c/0x5d0 [ 1398.078111] ? selinux_file_ioctl+0x125/0x5d0 [ 1398.082642] ? check_preemption_disabled+0x41/0x280 [ 1398.087680] ? ioctl_preallocate+0x200/0x200 [ 1398.092193] ? selinux_file_mprotect+0x600/0x600 [ 1398.096946] ? __fget+0x340/0x510 [ 1398.100409] ? iterate_fd+0x350/0x350 [ 1398.104221] ? putname+0xe1/0x120 [ 1398.107680] ? security_file_ioctl+0x6c/0xb0 [ 1398.112127] ksys_ioctl+0x9b/0xc0 [ 1398.115590] __x64_sys_ioctl+0x6f/0xb0 [ 1398.119473] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1398.124070] do_syscall_64+0xf9/0x620 [ 1398.127888] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1398.133080] RIP: 0033:0x45c6b7 [ 1398.136269] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1398.155180] RSP: 002b:00007ff11ffef9d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1398.162886] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045c6b7 [ 1398.170144] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1398.177399] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a 04:23:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file1\x00', 0x800, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) [ 1398.184655] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1398.191911] R13: 0000000000000c1b R14: 00000000004c1905 R15: 000000000000000a 04:23:19 executing program 3 (fault-call:0 fault-nth:11): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:19 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000, 0x40}}, 0x40) [ 1398.365903] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1398.491609] FAULT_INJECTION: forcing a failure. [ 1398.491609] name failslab, interval 1, probability 0, space 0, times 0 [ 1398.507114] CPU: 0 PID: 31681 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1398.515045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1398.524866] Call Trace: [ 1398.524923] dump_stack+0x188/0x20d [ 1398.524944] should_fail.cold+0xa/0x1b [ 1398.524961] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1398.524973] ? __lock_is_held+0xad/0x140 [ 1398.524992] ? loop_info64_to_compat+0x690/0x690 [ 1398.525009] ? loop_info64_to_compat+0x690/0x690 [ 1398.525024] __should_failslab+0x115/0x180 [ 1398.525037] should_failslab+0x5/0xf [ 1398.525048] kmem_cache_alloc_trace+0x2c6/0x7a0 [ 1398.525061] ? __lockdep_init_map+0x100/0x5a0 [ 1398.525077] ? __lockdep_init_map+0x100/0x5a0 [ 1398.525095] ? loop_info64_to_compat+0x690/0x690 [ 1398.525113] __kthread_create_on_node+0xd2/0x410 [ 1398.584778] ? __kthread_parkme+0x1b0/0x1b0 [ 1398.584801] ? lo_ioctl+0x1bb/0x20e0 [ 1398.584815] ? lock_downgrade+0x740/0x740 [ 1398.584833] ? loop_info64_to_compat+0x690/0x690 [ 1398.584848] kthread_create_on_node+0xbb/0xf0 [ 1398.584862] ? __kthread_create_on_node+0x410/0x410 [ 1398.584880] ? iterate_fd+0x350/0x350 [ 1398.584890] ? __lockdep_init_map+0x100/0x5a0 [ 1398.584911] ? __lockdep_init_map+0x100/0x5a0 [ 1398.624354] lo_ioctl+0xae2/0x20e0 [ 1398.624372] ? lo_rw_aio+0x12f0/0x12f0 [ 1398.624387] blkdev_ioctl+0xbf7/0x1a1c [ 1398.624402] ? blkpg_ioctl+0x9e0/0x9e0 [ 1398.624418] ? mark_held_locks+0xf0/0xf0 [ 1398.624435] ? find_held_lock+0x2d/0x110 [ 1398.624451] ? debug_check_no_obj_freed+0x20a/0x42e [ 1398.624479] block_ioctl+0xe9/0x130 [ 1398.624490] ? blkdev_fallocate+0x3f0/0x3f0 [ 1398.624507] do_vfs_ioctl+0xcda/0x12e0 04:23:19 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x13f) 04:23:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x2400, 0x6}]}, 0x44}}, 0x0) 04:23:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VFIO_IOMMU_GET_INFO(r1, 0x3b70, &(0x7f0000000040)={0x18, 0x0, 0x0, 0x1}) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000240)=@security={'security\x00', 0xe, 0x4, 0x568, 0x138, 0x138, 0x138, 0x0, 0x138, 0x498, 0x498, 0x498, 0x498, 0x498, 0x4, &(0x7f0000000100), {[{{@ipv6={@loopback, @loopback, [0xff, 0x1fe, 0xff, 0xff000000], [0x0, 0xffffff00, 0xff], 'macsec0\x00', 'veth0_to_bond\x00', {}, {}, 0x32, 0xd3, 0x2, 0x4}, 0x0, 0x100, 0x138, 0x0, {}, [@common=@inet=@socket2={{0x28, 'socket\x00'}, 0x2}, @common=@inet=@udp={{0x30, 'udp\x00'}, {[0x4e23, 0x4e23], [0x4e24, 0x4e20]}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffffffffffffffff, 0x1, 0x4}, {0x3, 0x5, 0x2}, {0x3, 0x5, 0x2}, 0xffff35a2, 0xffffb742}}}, {{@uncond, 0x0, 0x228, 0x250, 0x0, {}, [@common=@dst={{0x48, 'dst\x00'}, {0xb9d0, 0x1, 0x1, [0xffe0, 0x40, 0x800, 0x6, 0x0, 0x9, 0x40, 0xf9, 0x8, 0x4, 0xa42f, 0x5, 0x3, 0x4, 0x1, 0x2], 0xf}}, @common=@rt={{0x138, 'rt\x00'}, {0x0, [0x0, 0x4], 0x8, 0x10, 0x1, [@remote, @ipv4={[], [], @broadcast}, @rand_addr="673a54d5c29c8c3d7137e9e2eaff0808", @remote, @empty, @mcast1, @local, @remote, @remote, @empty, @empty, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, @dev={0xfe, 0x80, [], 0x34}, @mcast1, @remote]}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x6}}}, {{@uncond, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@frag={{0x30, 'frag\x00'}, {[0xd2, 0xf35], 0x10, 0x8, 0x2}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x3, 0x3, 0x5}, {0xffffffffffffffff, 0x1, 0x4}, {0x4, 0x3, 0x5}, 0x8, 0x9}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5c8) 04:23:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x4800}, 0x0) [ 1398.664742] ? selinux_file_ioctl+0x46c/0x5d0 [ 1398.664756] ? selinux_file_ioctl+0x125/0x5d0 [ 1398.664771] ? check_preemption_disabled+0x41/0x280 [ 1398.664786] ? ioctl_preallocate+0x200/0x200 [ 1398.664801] ? selinux_file_mprotect+0x600/0x600 [ 1398.664815] ? __fget+0x340/0x510 04:23:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$rxrpc(0x21, 0x2, 0x2) getsockname(r1, &(0x7f0000000100)=@x25, &(0x7f0000000040)=0x80) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='overriderockperm,M']) 04:23:20 executing program 3 (fault-call:0 fault-nth:12): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x2500, 0x6}]}, 0x44}}, 0x0) 04:23:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x4c00}, 0x0) [ 1398.664831] ? iterate_fd+0x350/0x350 [ 1398.664844] ? putname+0xe1/0x120 [ 1398.664865] ? security_file_ioctl+0x6c/0xb0 [ 1398.664880] ksys_ioctl+0x9b/0xc0 [ 1398.664896] __x64_sys_ioctl+0x6f/0xb0 [ 1398.664909] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1398.664924] do_syscall_64+0xf9/0x620 [ 1398.664941] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1398.664952] RIP: 0033:0x45c6b7 04:23:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x6000}, 0x0) 04:23:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) ioctl(r0, 0xc1e2, &(0x7f0000000100)="b31f05bb73ca3d206212d70f931a61c16e40119ff5fb96e6cb50352b1485304d539a1171368ec2c5f0b74449a9dafb7a3f889c6b27302375282616f66f1ae3930e1803f727f4b902a5281d8a5bf291f9fe4f0a878b3ec9375e9b6ae2535d9b903abab4c97662306b015c5a7f50a87315843ccd9892fb32376e9bb98b4861f28dda6313c96712c4565f80e7cb7834c3") r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xed5) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) 04:23:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x2600, 0x6}]}, 0x44}}, 0x0) [ 1398.664967] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1398.664974] RSP: 002b:00007ff11ffef9d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1398.664986] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045c6b7 [ 1398.664994] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1398.665002] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1398.665010] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1398.665018] R13: 0000000000000c1b R14: 00000000004c1905 R15: 000000000000000b [ 1398.798219] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1398.800290] x_tables: duplicate underflow at hook 2 [ 1398.981792] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1399.033063] FAULT_INJECTION: forcing a failure. [ 1399.033063] name failslab, interval 1, probability 0, space 0, times 0 [ 1399.033172] CPU: 1 PID: 31717 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1399.033181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1399.033185] Call Trace: [ 1399.033206] dump_stack+0x188/0x20d [ 1399.033229] should_fail.cold+0xa/0x1b [ 1399.033246] ? is_bpf_text_address+0xd0/0x160 [ 1399.033270] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1399.033284] ? kernel_text_address+0x6e/0xe0 [ 1399.033298] ? __kernel_text_address+0x9/0x30 [ 1399.033313] ? unwind_get_return_address+0x5a/0xa0 [ 1399.033335] __should_failslab+0x115/0x180 [ 1399.033351] should_failslab+0x5/0xf [ 1399.033364] kmem_cache_alloc+0x44/0x710 [ 1399.033380] ? save_stack+0x89/0xa0 [ 1399.033398] radix_tree_node_alloc.constprop.0+0x1e3/0x330 [ 1399.033416] idr_get_free+0x55f/0xa34 [ 1399.033442] idr_alloc_u32+0x1a2/0x320 [ 1399.033461] ? __fprop_inc_percpu_max+0x210/0x210 [ 1399.033473] ? find_held_lock+0x2d/0x110 [ 1399.033495] ? __lock_is_held+0xad/0x140 [ 1399.033513] idr_alloc_cyclic+0x102/0x220 [ 1399.033529] ? idr_alloc+0x130/0x130 [ 1399.033552] __kernfs_new_node+0x11a/0x680 [ 1399.033568] ? kernfs_dop_revalidate+0x3b0/0x3b0 [ 1399.033580] ? find_held_lock+0x2d/0x110 [ 1399.033593] ? update_curr+0x3b9/0x870 [ 1399.033614] ? mark_held_locks+0xf0/0xf0 [ 1399.033630] kernfs_new_node+0x92/0x120 [ 1399.033647] kernfs_create_dir_ns+0x48/0x150 [ 1399.033665] internal_create_group+0x1bf/0xb90 [ 1399.033678] ? find_held_lock+0x2d/0x110 [ 1399.033693] ? lo_ioctl+0xf54/0x20e0 [ 1399.033709] ? lock_acquire+0x170/0x400 [ 1399.033724] ? remove_files.isra.0+0x190/0x190 [ 1399.033737] ? lock_downgrade+0x740/0x740 [ 1399.033758] lo_ioctl+0xf89/0x20e0 [ 1399.033773] ? lo_rw_aio+0x12f0/0x12f0 [ 1399.033790] blkdev_ioctl+0xbf7/0x1a1c [ 1399.033804] ? blkpg_ioctl+0x9e0/0x9e0 [ 1399.033818] ? mark_held_locks+0xf0/0xf0 [ 1399.033835] ? find_held_lock+0x2d/0x110 [ 1399.033853] ? debug_check_no_obj_freed+0x20a/0x42e [ 1399.033880] block_ioctl+0xe9/0x130 [ 1399.033892] ? blkdev_fallocate+0x3f0/0x3f0 [ 1399.033907] do_vfs_ioctl+0xcda/0x12e0 [ 1399.033923] ? selinux_file_ioctl+0x46c/0x5d0 [ 1399.033938] ? selinux_file_ioctl+0x125/0x5d0 [ 1399.033952] ? check_preemption_disabled+0x41/0x280 [ 1399.033964] ? ioctl_preallocate+0x200/0x200 [ 1399.033978] ? selinux_file_mprotect+0x600/0x600 [ 1399.033991] ? __fget+0x340/0x510 [ 1399.034008] ? iterate_fd+0x350/0x350 [ 1399.034021] ? putname+0xe1/0x120 [ 1399.034042] ? security_file_ioctl+0x6c/0xb0 [ 1399.034056] ksys_ioctl+0x9b/0xc0 [ 1399.034070] __x64_sys_ioctl+0x6f/0xb0 [ 1399.034083] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1399.034098] do_syscall_64+0xf9/0x620 [ 1399.034115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1399.034126] RIP: 0033:0x45c6b7 [ 1399.034141] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1399.034148] RSP: 002b:00007ff11ffef9d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1399.034161] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045c6b7 [ 1399.034169] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1399.034177] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a 04:23:20 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000, 0x40}}, 0x40) 04:23:20 executing program 3 (fault-call:0 fault-nth:13): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='overrieerockperm,\x00']) 04:23:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x6800}, 0x0) 04:23:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x2700, 0x6}]}, 0x44}}, 0x0) 04:23:20 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x140) [ 1399.034185] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1399.034193] R13: 0000000000000c1b R14: 00000000004c1905 R15: 000000000000000c [ 1399.156643] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1399.707647] FAULT_INJECTION: forcing a failure. [ 1399.707647] name failslab, interval 1, probability 0, space 0, times 0 [ 1399.720410] CPU: 0 PID: 31752 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1399.728321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1399.737688] Call Trace: [ 1399.740326] dump_stack+0x188/0x20d [ 1399.743975] should_fail.cold+0xa/0x1b [ 1399.747881] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1399.753006] ? __lock_is_held+0xad/0x140 [ 1399.757091] __should_failslab+0x115/0x180 [ 1399.757953] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1399.761335] should_failslab+0x5/0xf [ 1399.761349] kmem_cache_alloc+0x29f/0x710 [ 1399.761369] __kernfs_new_node+0xd2/0x680 [ 1399.761382] ? kernfs_add_one+0x377/0x4d0 [ 1399.761396] ? kernfs_dop_revalidate+0x3b0/0x3b0 [ 1399.761410] ? mutex_trylock+0x1a0/0x1a0 [ 1399.761423] ? lock_downgrade+0x740/0x740 [ 1399.761440] ? mutex_trylock+0x1a0/0x1a0 [ 1399.803046] ? __mutex_unlock_slowpath+0xea/0x670 04:23:20 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000, 0x40}}, 0x40) [ 1399.807911] kernfs_new_node+0x92/0x120 [ 1399.811899] __kernfs_create_file+0x51/0x33f [ 1399.816326] sysfs_add_file_mode_ns+0x224/0x520 [ 1399.821018] internal_create_group+0x359/0xb90 [ 1399.825604] ? lock_acquire+0x170/0x400 [ 1399.829578] ? remove_files.isra.0+0x190/0x190 [ 1399.834162] ? lock_downgrade+0x740/0x740 [ 1399.838302] lo_ioctl+0xf89/0x20e0 [ 1399.841829] ? lo_rw_aio+0x12f0/0x12f0 [ 1399.845715] blkdev_ioctl+0xbf7/0x1a1c [ 1399.849614] ? blkpg_ioctl+0x9e0/0x9e0 [ 1399.853501] ? mark_held_locks+0xf0/0xf0 [ 1399.857547] ? find_held_lock+0x2d/0x110 [ 1399.861704] ? debug_check_no_obj_freed+0x20a/0x42e [ 1399.866715] block_ioctl+0xe9/0x130 [ 1399.870342] ? blkdev_fallocate+0x3f0/0x3f0 [ 1399.874666] do_vfs_ioctl+0xcda/0x12e0 [ 1399.878550] ? selinux_file_ioctl+0x46c/0x5d0 [ 1399.883031] ? selinux_file_ioctl+0x125/0x5d0 [ 1399.887526] ? check_preemption_disabled+0x41/0x280 [ 1399.892558] ? ioctl_preallocate+0x200/0x200 [ 1399.896972] ? selinux_file_mprotect+0x600/0x600 [ 1399.901725] ? __fget+0x340/0x510 [ 1399.905221] ? iterate_fd+0x350/0x350 [ 1399.909026] ? putname+0xe1/0x120 [ 1399.912508] ? security_file_ioctl+0x6c/0xb0 [ 1399.916967] ksys_ioctl+0x9b/0xc0 [ 1399.920434] __x64_sys_ioctl+0x6f/0xb0 [ 1399.924333] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1399.928937] do_syscall_64+0xf9/0x620 [ 1399.932756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1399.937951] RIP: 0033:0x45c6b7 04:23:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x6c00}, 0x0) 04:23:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x2800, 0x6}]}, 0x44}}, 0x0) [ 1399.941185] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1399.960177] RSP: 002b:00007ff11ffef9d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1399.967886] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045c6b7 [ 1399.975159] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1399.982472] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1399.989774] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1399.997096] R13: 0000000000000c1b R14: 00000000004c1905 R15: 000000000000000d 04:23:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SVE_GET_VL(0x33, 0x7d67) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) r3 = getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000300)={0xa5, 0x7d, 0x2, {{0x0, 0x90, 0x0, 0x0, {0x0, 0x1, 0x2}, 0x20090000, 0x1, 0x8, 0x80, 0x9, 'ip6_vti0\x00', 0x12, 'securitywlan0self)', 0x21, 'system_u:object_r:hald_exec_t:s0\x00', 0x21, 'system_u:object_r:hald_exec_t:s0\x00'}, 0x0, '', 0x0, r2, r3}}, 0xa5) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@norock='norock'}, {@norock='norock'}, {@check_relaxed='check=relaxed'}, {@map_off='map=off'}, {@map_normal='map=normal'}, {@gid={'gid', 0x3d, r2}}, {@utf8='utf8'}, {@hide='hide'}]}) 04:23:21 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000, 0x40}}, 0x40) [ 1400.148920] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x2900, 0x6}]}, 0x44}}, 0x0) 04:23:21 executing program 3 (fault-call:0 fault-nth:14): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x7400}, 0x0) 04:23:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x2a00, 0x6}]}, 0x44}}, 0x0) 04:23:21 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000, 0x40}}, 0x40) 04:23:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) r4 = getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000300)={0xa5, 0x7d, 0x2, {{0x0, 0x90, 0x0, 0x0, {0x0, 0x1, 0x2}, 0x20090000, 0x1, 0x8, 0x80, 0x9, 'ip6_vti0\x00', 0x12, 'securitywlan0self)', 0x21, 'system_u:object_r:hald_exec_t:s0\x00', 0x21, 'system_u:object_r:hald_exec_t:s0\x00'}, 0x0, '', 0x0, r3, r4}}, 0xa5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) r6 = getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000300)={0xa5, 0x7d, 0x2, {{0x0, 0x90, 0x0, 0x0, {0x0, 0x1, 0x2}, 0x20090000, 0x1, 0x8, 0x80, 0x9, 'ip6_vti0\x00', 0x12, 'securitywlan0self)', 0x21, 'system_u:object_r:hald_exec_t:s0\x00', 0x21, 'system_u:object_r:hald_exec_t:s0\x00'}, 0x0, '', 0x0, r5, r6}}, 0xa5) write$P9_RGETATTR(r2, &(0x7f0000000100)={0xa0, 0x19, 0x1, {0x1, {0x10, 0x3, 0x8}, 0x8, r4, r5, 0x8, 0x0, 0x2, 0x3, 0x5, 0x401, 0xffff, 0x4, 0x60, 0x7f, 0xfffffffffffffffa, 0x9, 0x9a646fb, 0x3f, 0x7fffffff}}, 0xa0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) [ 1400.375137] FAULT_INJECTION: forcing a failure. [ 1400.375137] name failslab, interval 1, probability 0, space 0, times 0 [ 1400.386899] CPU: 1 PID: 31794 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1400.394813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1400.404179] Call Trace: [ 1400.406790] dump_stack+0x188/0x20d [ 1400.410445] should_fail.cold+0xa/0x1b [ 1400.414406] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1400.419505] ? __lock_is_held+0xad/0x140 [ 1400.423566] __should_failslab+0x115/0x180 [ 1400.427787] should_failslab+0x5/0xf [ 1400.431543] kmem_cache_alloc+0x29f/0x710 [ 1400.435767] ? kernfs_add_one+0x377/0x4d0 [ 1400.439921] __kernfs_new_node+0xd2/0x680 [ 1400.444073] ? kernfs_dop_revalidate+0x3b0/0x3b0 [ 1400.448830] ? __mutex_unlock_slowpath+0xea/0x670 [ 1400.453667] ? wait_for_completion+0x3c0/0x3c0 [ 1400.458274] ? kernfs_next_descendant_post+0x27f/0x2c0 [ 1400.463542] kernfs_new_node+0x92/0x120 [ 1400.467570] __kernfs_create_file+0x51/0x33f [ 1400.471983] sysfs_add_file_mode_ns+0x224/0x520 [ 1400.476851] internal_create_group+0x359/0xb90 [ 1400.481442] ? lock_acquire+0x170/0x400 [ 1400.485425] ? remove_files.isra.0+0x190/0x190 [ 1400.490020] ? lock_downgrade+0x740/0x740 [ 1400.494171] lo_ioctl+0xf89/0x20e0 [ 1400.497721] ? lo_rw_aio+0x12f0/0x12f0 [ 1400.501616] blkdev_ioctl+0xbf7/0x1a1c [ 1400.505506] ? blkpg_ioctl+0x9e0/0x9e0 [ 1400.509389] ? mark_held_locks+0xf0/0xf0 [ 1400.513451] ? find_held_lock+0x2d/0x110 [ 1400.517536] ? debug_check_no_obj_freed+0x20a/0x42e [ 1400.522555] block_ioctl+0xe9/0x130 [ 1400.526201] ? blkdev_fallocate+0x3f0/0x3f0 [ 1400.530542] do_vfs_ioctl+0xcda/0x12e0 [ 1400.534444] ? selinux_file_ioctl+0x46c/0x5d0 [ 1400.538940] ? selinux_file_ioctl+0x125/0x5d0 [ 1400.544575] ? check_preemption_disabled+0x41/0x280 [ 1400.549598] ? ioctl_preallocate+0x200/0x200 [ 1400.554016] ? selinux_file_mprotect+0x600/0x600 [ 1400.558789] ? __fget+0x340/0x510 [ 1400.562253] ? iterate_fd+0x350/0x350 [ 1400.566062] ? putname+0xe1/0x120 [ 1400.569518] ? security_file_ioctl+0x6c/0xb0 [ 1400.573956] ksys_ioctl+0x9b/0xc0 [ 1400.577409] __x64_sys_ioctl+0x6f/0xb0 [ 1400.581403] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1400.586139] do_syscall_64+0xf9/0x620 [ 1400.589952] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1400.595137] RIP: 0033:0x45c6b7 [ 1400.598462] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1400.617484] RSP: 002b:00007ff11ffef9d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 04:23:21 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x141) 04:23:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x7a00}, 0x0) [ 1400.625202] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045c6b7 [ 1400.632475] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1400.639753] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1400.647020] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1400.654293] R13: 0000000000000c1b R14: 00000000004c1905 R15: 000000000000000e 04:23:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x2b00, 0x6}]}, 0x44}}, 0x0) 04:23:22 executing program 3 (fault-call:0 fault-nth:15): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:22 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000, 0x40}}, 0x40) 04:23:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) 04:23:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0xf000}, 0x0) 04:23:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x2c00, 0x6}]}, 0x44}}, 0x0) [ 1400.998887] FAULT_INJECTION: forcing a failure. [ 1400.998887] name failslab, interval 1, probability 0, space 0, times 0 [ 1401.017605] CPU: 0 PID: 31835 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1401.025534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1401.035250] Call Trace: [ 1401.037855] dump_stack+0x188/0x20d [ 1401.041501] should_fail.cold+0xa/0x1b 04:23:22 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000, 0x40}}, 0x40) [ 1401.045415] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1401.050536] ? __lock_is_held+0xad/0x140 [ 1401.054632] __should_failslab+0x115/0x180 [ 1401.058882] should_failslab+0x5/0xf [ 1401.062606] kmem_cache_alloc+0x29f/0x710 [ 1401.066756] ? kernfs_add_one+0x377/0x4d0 [ 1401.070898] __kernfs_new_node+0xd2/0x680 [ 1401.075034] ? kernfs_dop_revalidate+0x3b0/0x3b0 [ 1401.079795] ? __mutex_unlock_slowpath+0xea/0x670 [ 1401.084688] ? wait_for_completion+0x3c0/0x3c0 [ 1401.089270] ? kernfs_next_descendant_post+0x27f/0x2c0 [ 1401.094553] kernfs_new_node+0x92/0x120 [ 1401.098532] __kernfs_create_file+0x51/0x33f [ 1401.102948] sysfs_add_file_mode_ns+0x224/0x520 [ 1401.107611] internal_create_group+0x359/0xb90 [ 1401.112234] ? lock_acquire+0x170/0x400 [ 1401.116197] ? remove_files.isra.0+0x190/0x190 [ 1401.120780] ? lock_downgrade+0x740/0x740 [ 1401.124963] lo_ioctl+0xf89/0x20e0 [ 1401.128543] ? lo_rw_aio+0x12f0/0x12f0 [ 1401.132489] blkdev_ioctl+0xbf7/0x1a1c [ 1401.136371] ? blkpg_ioctl+0x9e0/0x9e0 [ 1401.140261] ? mark_held_locks+0xf0/0xf0 [ 1401.144324] ? find_held_lock+0x2d/0x110 [ 1401.148389] ? debug_check_no_obj_freed+0x20a/0x42e [ 1401.153502] block_ioctl+0xe9/0x130 [ 1401.157125] ? blkdev_fallocate+0x3f0/0x3f0 [ 1401.161442] do_vfs_ioctl+0xcda/0x12e0 [ 1401.165331] ? selinux_file_ioctl+0x46c/0x5d0 [ 1401.169829] ? selinux_file_ioctl+0x125/0x5d0 [ 1401.174327] ? check_preemption_disabled+0x41/0x280 [ 1401.179353] ? ioctl_preallocate+0x200/0x200 [ 1401.183764] ? selinux_file_mprotect+0x600/0x600 [ 1401.188533] ? __fget+0x340/0x510 [ 1401.192048] ? iterate_fd+0x350/0x350 [ 1401.195835] ? putname+0xe1/0x120 [ 1401.199298] ? security_file_ioctl+0x6c/0xb0 [ 1401.205620] ksys_ioctl+0x9b/0xc0 [ 1401.209079] __x64_sys_ioctl+0x6f/0xb0 [ 1401.212968] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1401.217544] do_syscall_64+0xf9/0x620 [ 1401.221343] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1401.226573] RIP: 0033:0x45c6b7 [ 1401.229782] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:23:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x34000}, 0x0) [ 1401.248887] RSP: 002b:00007ff11ffef9d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1401.256608] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045c6b7 [ 1401.263881] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1401.271247] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1401.278519] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1401.285958] R13: 0000000000000c1b R14: 00000000004c1905 R15: 000000000000000f 04:23:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat(r3, &(0x7f0000000580)='./file1\x00', 0x2, 0x4) sendmsg$NFT_MSG_GETTABLE(r4, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x48, 0x1, 0xa, 0x301, 0x0, 0x0, {0x0, 0x0, 0x4}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6f76657272696465726f637f5765726d2c00"]) 04:23:22 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a00000000000000, 0x40}}, 0x40) 04:23:22 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x142) 04:23:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x2d00, 0x6}]}, 0x44}}, 0x0) 04:23:22 executing program 3 (fault-call:0 fault-nth:16): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x400300}, 0x0) 04:23:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x840049, &(0x7f0000000000)=ANY=[@ANYBLOB="6f76657272277c65726f636b7065726d2cc3"]) 04:23:22 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b00000000000000, 0x40}}, 0x40) 04:23:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x2e00, 0x6}]}, 0x44}}, 0x0) [ 1401.700062] nla_parse: 4 callbacks suppressed [ 1401.700072] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0xf0ff7f}, 0x0) 04:23:22 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e00000000000000, 0x40}}, 0x40) [ 1401.743455] FAULT_INJECTION: forcing a failure. [ 1401.743455] name failslab, interval 1, probability 0, space 0, times 0 [ 1401.761576] CPU: 1 PID: 31881 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1401.769517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1401.778863] Call Trace: [ 1401.781444] dump_stack+0x188/0x20d [ 1401.785065] should_fail.cold+0xa/0x1b [ 1401.788945] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1401.794044] ? __lock_is_held+0xad/0x140 [ 1401.798107] __should_failslab+0x115/0x180 [ 1401.802366] should_failslab+0x5/0xf [ 1401.806065] kmem_cache_alloc+0x29f/0x710 [ 1401.810245] ? kernfs_add_one+0x377/0x4d0 [ 1401.814394] __kernfs_new_node+0xd2/0x680 [ 1401.818547] ? kernfs_dop_revalidate+0x3b0/0x3b0 [ 1401.823298] ? __mutex_unlock_slowpath+0xea/0x670 [ 1401.828260] ? wait_for_completion+0x3c0/0x3c0 [ 1401.832915] ? kernfs_next_descendant_post+0x27f/0x2c0 [ 1401.838238] kernfs_new_node+0x92/0x120 [ 1401.842206] __kernfs_create_file+0x51/0x33f [ 1401.846606] sysfs_add_file_mode_ns+0x224/0x520 [ 1401.851292] internal_create_group+0x359/0xb90 [ 1401.855880] ? lock_acquire+0x170/0x400 [ 1401.859853] ? remove_files.isra.0+0x190/0x190 [ 1401.864424] ? lock_downgrade+0x740/0x740 [ 1401.868572] lo_ioctl+0xf89/0x20e0 [ 1401.872110] ? lo_rw_aio+0x12f0/0x12f0 [ 1401.875996] blkdev_ioctl+0xbf7/0x1a1c [ 1401.879885] ? blkpg_ioctl+0x9e0/0x9e0 [ 1401.883772] ? mark_held_locks+0xf0/0xf0 [ 1401.887821] ? find_held_lock+0x2d/0x110 [ 1401.891870] ? debug_check_no_obj_freed+0x20a/0x42e [ 1401.896890] block_ioctl+0xe9/0x130 [ 1401.900503] ? blkdev_fallocate+0x3f0/0x3f0 [ 1401.904814] do_vfs_ioctl+0xcda/0x12e0 [ 1401.908703] ? selinux_file_ioctl+0x46c/0x5d0 [ 1401.913189] ? selinux_file_ioctl+0x125/0x5d0 [ 1401.917674] ? check_preemption_disabled+0x41/0x280 [ 1401.922677] ? ioctl_preallocate+0x200/0x200 [ 1401.927072] ? selinux_file_mprotect+0x600/0x600 [ 1401.931816] ? __fget+0x340/0x510 [ 1401.935257] ? iterate_fd+0x350/0x350 [ 1401.939054] ? putname+0xe1/0x120 [ 1401.942495] ? security_file_ioctl+0x6c/0xb0 [ 1401.946890] ksys_ioctl+0x9b/0xc0 [ 1401.950356] __x64_sys_ioctl+0x6f/0xb0 [ 1401.954245] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1401.958818] do_syscall_64+0xf9/0x620 [ 1401.962612] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1401.967787] RIP: 0033:0x45c6b7 [ 1401.970975] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1401.989953] RSP: 002b:00007ff11ffef9d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1401.997647] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045c6b7 [ 1402.004914] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1402.012167] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1402.019423] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1402.026675] R13: 0000000000000c1b R14: 00000000004c1905 R15: 0000000000000010 04:23:23 executing program 3 (fault-call:0 fault-nth:17): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x2f00, 0x6}]}, 0x44}}, 0x0) [ 1402.234498] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:23 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f00000000000000, 0x40}}, 0x40) [ 1402.311834] FAULT_INJECTION: forcing a failure. [ 1402.311834] name failslab, interval 1, probability 0, space 0, times 0 [ 1402.337217] CPU: 0 PID: 31908 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1402.345153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1402.354518] Call Trace: [ 1402.357108] dump_stack+0x188/0x20d [ 1402.360734] should_fail.cold+0xa/0x1b [ 1402.364616] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1402.369712] ? __lock_is_held+0xad/0x140 [ 1402.373773] __should_failslab+0x115/0x180 [ 1402.378021] should_failslab+0x5/0xf [ 1402.381730] kmem_cache_alloc+0x29f/0x710 [ 1402.385869] ? kernfs_add_one+0x377/0x4d0 [ 1402.390010] __kernfs_new_node+0xd2/0x680 [ 1402.394148] ? kernfs_dop_revalidate+0x3b0/0x3b0 [ 1402.398894] ? __mutex_unlock_slowpath+0xea/0x670 [ 1402.403732] ? wait_for_completion+0x3c0/0x3c0 [ 1402.408329] ? kernfs_next_descendant_post+0x27f/0x2c0 [ 1402.413619] kernfs_new_node+0x92/0x120 [ 1402.417610] __kernfs_create_file+0x51/0x33f [ 1402.422026] sysfs_add_file_mode_ns+0x224/0x520 [ 1402.426700] internal_create_group+0x359/0xb90 [ 1402.431284] ? lock_acquire+0x170/0x400 [ 1402.435251] ? remove_files.isra.0+0x190/0x190 [ 1402.439820] ? lock_downgrade+0x740/0x740 [ 1402.443966] lo_ioctl+0xf89/0x20e0 [ 1402.447497] ? lo_rw_aio+0x12f0/0x12f0 [ 1402.451373] blkdev_ioctl+0xbf7/0x1a1c [ 1402.455251] ? blkpg_ioctl+0x9e0/0x9e0 [ 1402.459129] ? mark_held_locks+0xf0/0xf0 [ 1402.463181] ? find_held_lock+0x2d/0x110 [ 1402.467263] ? debug_check_no_obj_freed+0x20a/0x42e [ 1402.472278] block_ioctl+0xe9/0x130 [ 1402.475898] ? blkdev_fallocate+0x3f0/0x3f0 [ 1402.480219] do_vfs_ioctl+0xcda/0x12e0 [ 1402.484096] ? selinux_file_ioctl+0x46c/0x5d0 [ 1402.488583] ? selinux_file_ioctl+0x125/0x5d0 [ 1402.493071] ? check_preemption_disabled+0x41/0x280 [ 1402.498077] ? ioctl_preallocate+0x200/0x200 [ 1402.502484] ? selinux_file_mprotect+0x600/0x600 [ 1402.507240] ? __fget+0x340/0x510 [ 1402.510697] ? iterate_fd+0x350/0x350 [ 1402.514486] ? putname+0xe1/0x120 [ 1402.517935] ? security_file_ioctl+0x6c/0xb0 [ 1402.522333] ksys_ioctl+0x9b/0xc0 [ 1402.525786] __x64_sys_ioctl+0x6f/0xb0 [ 1402.529685] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1402.534255] do_syscall_64+0xf9/0x620 [ 1402.538134] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1402.543332] RIP: 0033:0x45c6b7 [ 1402.546522] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1402.565531] RSP: 002b:00007ff11ffef9d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1402.573236] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045c6b7 [ 1402.580493] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1402.587763] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1402.595019] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1402.602290] R13: 0000000000000c1b R14: 00000000004c1905 R15: 0000000000000011 04:23:23 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x143) 04:23:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) r2 = getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000300)={0xa5, 0x7d, 0x2, {{0x0, 0x90, 0x0, 0x0, {0x0, 0x1, 0x2}, 0x20090000, 0x1, 0x8, 0x80, 0x9, 'ip6_vti0\x00', 0x12, 'securitywlan0self)', 0x21, 'system_u:object_r:hald_exec_t:s0\x00', 0x21, 'system_u:object_r:hald_exec_t:s0\x00'}, 0x0, '', 0x0, 0x0, r2}}, 0xa5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) r4 = getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000300)={0xa5, 0x7d, 0x2, {{0x0, 0x90, 0x0, 0x0, {0x0, 0x1, 0x2}, 0x20090000, 0x1, 0x8, 0x80, 0x9, 'ip6_vti0\x00', 0x12, 'securitywlan0self)', 0x21, 'system_u:object_r:hald_exec_t:s0\x00', 0x21, 'system_u:object_r:hald_exec_t:s0\x00'}, 0x0, '', 0x0, r3, r4}}, 0xa5) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file1\x00', 0x0, 0x20}, 0x10) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x2) ptrace$cont(0x18, r6, 0x0, 0x0) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r6, 0x0, 0x0) r7 = getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000300)={0xa5, 0x7d, 0x2, {{0x0, 0x90, 0x3ff, 0x0, {0x0, 0x1, 0x2}, 0x20090000, 0x1, 0x8, 0x80, 0x9, 'ip6_vti0\x00', 0x12, 'securitywlan0self)', 0x21, 'system_u:object_r:hald_exec_t:s0\x00', 0x21, 'system_u:object_r:hald_exec_t:s0\x00'}, 0x0, '', 0x0, 0x0, r7}}, 0xa5) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)=0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000180)="ee4ab0cda109c186484e110d0d3580f82051eee661b1e0c0c172d3a94ccca1f5fb4e8be1780e6d316eedf4a257a188bff77f13df20f4fea0b83c05643f01daae766c90f452fa970aa325e2489d73eb20a3e84d4e1d395192b014d5eb3ac18d6e1c8ade42ce", 0x65}, {&(0x7f0000000240)="df40d81665570d3b17fa69d0abd0b024e4dd8c133065e546558e53240bf12619c6eb18e6930019a24248a053dc5b4e33fc397d574d84607e75199ee77b5d8c06313b840325225cd365449a1ca84406dab7447558e1a5b6bd665a888ff42bb54e8b35c73b23c7da9df05ca5c03fa228a2ba2c2c466833ea670b4587f92de579b8136e3aa35741a8f1b8114ab828d695ef427f899f014af6d362454573c06cef2851103b2c9bd0f80d1deb4f5a89e6007349f786a06b612aa7aa7a0b73ce0a481601ad9b0a8da1bafb40", 0xc9}, {&(0x7f0000000040)="a81b52cca9402a893c7244248f5aff8ed5f6279ee46a102326df6d79808b54409d21907bdc7f9cf497a0bc", 0x2b}, {&(0x7f0000000340)="3f390a14009dc6fff4a8aa883c5232e137a65035895edfa6a6cb00fa53c6501651a05ce37d79e94df7b77bd1d078d6c80df1976df5ded5b2fe13e96e1ee5b418e071f0e1028465fd3738c5890275c026036d0430a58e3989f998", 0x5a}, {&(0x7f00000003c0)="8f74e26b1968f5ae7fbf42522c6b3c47b2066f9c207f6dc2c0cb7354f28d19f541abcdd53c", 0x25}], 0x5, &(0x7f0000000700)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, r2, r3}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r5]}}, @cred={{0x1c, 0x1, 0x2, {r6, r7, r8}}}], 0x78, 0x40}], 0x1, 0x10) 04:23:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x3000, 0x6}]}, 0x44}}, 0x0) 04:23:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0xf0ffff}, 0x0) 04:23:23 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00000000000000, 0x40}}, 0x40) 04:23:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) 04:23:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x3100, 0x6}]}, 0x44}}, 0x0) [ 1402.806473] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x1000000}, 0x0) 04:23:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000, 0x40}}, 0x40) 04:23:24 executing program 3 (fault-call:0 fault-nth:18): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 1402.984252] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@norock='norock'}], [{@appraise='appraise'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'overrf\xf6erock\xecevm'}}]}) 04:23:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x3200, 0x6}]}, 0x44}}, 0x0) [ 1403.097060] FAULT_INJECTION: forcing a failure. [ 1403.097060] name failslab, interval 1, probability 0, space 0, times 0 [ 1403.115079] CPU: 1 PID: 31958 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1403.123121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1403.132489] Call Trace: [ 1403.135098] dump_stack+0x188/0x20d [ 1403.138746] should_fail.cold+0xa/0x1b [ 1403.142645] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1403.147739] ? __lock_is_held+0xad/0x140 [ 1403.151828] __should_failslab+0x115/0x180 [ 1403.156056] should_failslab+0x5/0xf [ 1403.159774] kmem_cache_alloc+0x29f/0x710 [ 1403.163911] ? kernfs_add_one+0x377/0x4d0 [ 1403.168049] __kernfs_new_node+0xd2/0x680 [ 1403.172188] ? kernfs_dop_revalidate+0x3b0/0x3b0 [ 1403.176934] ? __mutex_unlock_slowpath+0xea/0x670 [ 1403.181771] ? wait_for_completion+0x3c0/0x3c0 [ 1403.186343] ? kernfs_next_descendant_post+0x27f/0x2c0 [ 1403.191621] kernfs_new_node+0x92/0x120 [ 1403.195599] __kernfs_create_file+0x51/0x33f [ 1403.199998] sysfs_add_file_mode_ns+0x224/0x520 [ 1403.204678] internal_create_group+0x359/0xb90 [ 1403.209265] ? lock_acquire+0x170/0x400 [ 1403.213252] ? remove_files.isra.0+0x190/0x190 [ 1403.218357] ? lock_downgrade+0x740/0x740 [ 1403.222502] lo_ioctl+0xf89/0x20e0 [ 1403.226038] ? lo_rw_aio+0x12f0/0x12f0 [ 1403.229916] blkdev_ioctl+0xbf7/0x1a1c [ 1403.233789] ? blkpg_ioctl+0x9e0/0x9e0 [ 1403.237670] ? mark_held_locks+0xf0/0xf0 [ 1403.241721] ? find_held_lock+0x2d/0x110 [ 1403.245770] ? debug_check_no_obj_freed+0x20a/0x42e [ 1403.251734] block_ioctl+0xe9/0x130 [ 1403.255356] ? blkdev_fallocate+0x3f0/0x3f0 [ 1403.259692] do_vfs_ioctl+0xcda/0x12e0 [ 1403.263595] ? selinux_file_ioctl+0x46c/0x5d0 [ 1403.268087] ? selinux_file_ioctl+0x125/0x5d0 [ 1403.272579] ? check_preemption_disabled+0x41/0x280 [ 1403.277662] ? ioctl_preallocate+0x200/0x200 [ 1403.282091] ? selinux_file_mprotect+0x600/0x600 [ 1403.286897] ? __fget+0x340/0x510 [ 1403.290393] ? iterate_fd+0x350/0x350 [ 1403.294234] ? putname+0xe1/0x120 [ 1403.297691] ? security_file_ioctl+0x6c/0xb0 [ 1403.302090] ksys_ioctl+0x9b/0xc0 [ 1403.305548] __x64_sys_ioctl+0x6f/0xb0 [ 1403.309432] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1403.314053] do_syscall_64+0xf9/0x620 [ 1403.317858] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1403.323042] RIP: 0033:0x45c6b7 [ 1403.326227] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1403.345123] RSP: 002b:00007ff11ffef9d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1403.352879] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045c6b7 [ 1403.360168] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1403.367490] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1403.374774] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1403.382043] R13: 0000000000000c1b R14: 00000000004c1905 R15: 0000000000000012 04:23:24 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x144) 04:23:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b00000000000000, 0x40}}, 0x40) 04:23:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x2000000}, 0x0) 04:23:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x3300, 0x6}]}, 0x44}}, 0x0) 04:23:24 executing program 3 (fault-call:0 fault-nth:19): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6f766572726973e26465726f636b7065726d2c00"]) setxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:gpg_agent_exec_t:s0\x00', 0x26, 0x1) 04:23:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x40) 04:23:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x3400, 0x6}]}, 0x44}}, 0x0) [ 1403.584154] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1403.598525] FAULT_INJECTION: forcing a failure. [ 1403.598525] name failslab, interval 1, probability 0, space 0, times 0 04:23:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x3000000}, 0x0) [ 1403.627362] CPU: 1 PID: 31984 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1403.635312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1403.644680] Call Trace: [ 1403.647286] dump_stack+0x188/0x20d [ 1403.650946] should_fail.cold+0xa/0x1b [ 1403.654866] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1403.659991] ? __lock_is_held+0xad/0x140 [ 1403.664124] __should_failslab+0x115/0x180 [ 1403.668361] should_failslab+0x5/0xf [ 1403.672078] kmem_cache_alloc+0x29f/0x710 [ 1403.676222] ? kernfs_add_one+0x377/0x4d0 [ 1403.680417] __kernfs_new_node+0xd2/0x680 [ 1403.684557] ? kernfs_dop_revalidate+0x3b0/0x3b0 [ 1403.689305] ? __mutex_unlock_slowpath+0xea/0x670 [ 1403.694189] ? wait_for_completion+0x3c0/0x3c0 [ 1403.698773] ? kernfs_next_descendant_post+0x27f/0x2c0 [ 1403.704056] kernfs_new_node+0x92/0x120 [ 1403.708023] __kernfs_create_file+0x51/0x33f [ 1403.712420] sysfs_add_file_mode_ns+0x224/0x520 [ 1403.717080] internal_create_group+0x359/0xb90 [ 1403.721655] ? lock_acquire+0x170/0x400 [ 1403.725618] ? remove_files.isra.0+0x190/0x190 [ 1403.730224] ? lock_downgrade+0x740/0x740 [ 1403.734418] lo_ioctl+0xf89/0x20e0 [ 1403.737948] ? lo_rw_aio+0x12f0/0x12f0 [ 1403.741825] blkdev_ioctl+0xbf7/0x1a1c [ 1403.745698] ? blkpg_ioctl+0x9e0/0x9e0 [ 1403.749613] ? mark_held_locks+0xf0/0xf0 [ 1403.753698] ? find_held_lock+0x2d/0x110 [ 1403.757753] ? debug_check_no_obj_freed+0x20a/0x42e [ 1403.762761] block_ioctl+0xe9/0x130 [ 1403.766387] ? blkdev_fallocate+0x3f0/0x3f0 [ 1403.770697] do_vfs_ioctl+0xcda/0x12e0 [ 1403.774570] ? selinux_file_ioctl+0x46c/0x5d0 [ 1403.779063] ? selinux_file_ioctl+0x125/0x5d0 [ 1403.783550] ? check_preemption_disabled+0x41/0x280 [ 1403.788572] ? ioctl_preallocate+0x200/0x200 [ 1403.792980] ? selinux_file_mprotect+0x600/0x600 [ 1403.797729] ? __fget+0x340/0x510 [ 1403.801196] ? iterate_fd+0x350/0x350 [ 1403.804991] ? putname+0xe1/0x120 [ 1403.808438] ? security_file_ioctl+0x6c/0xb0 [ 1403.813249] ksys_ioctl+0x9b/0xc0 [ 1403.816704] __x64_sys_ioctl+0x6f/0xb0 [ 1403.820595] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1403.825217] do_syscall_64+0xf9/0x620 [ 1403.829011] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1403.834189] RIP: 0033:0x45c6b7 [ 1403.837371] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1403.856268] RSP: 002b:00007ff11ffef9d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1403.863989] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045c6b7 [ 1403.871268] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1403.878529] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1403.885788] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1403.893059] R13: 0000000000000c1b R14: 00000000004c1905 R15: 0000000000000013 04:23:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000100)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@nocompress='nocompress'}]}) [ 1403.975617] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x3500, 0x6}]}, 0x44}}, 0x0) 04:23:25 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x40) 04:23:25 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x145) 04:23:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x4000000}, 0x0) 04:23:25 executing program 3 (fault-call:0 fault-nth:20): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x3600, 0x6}]}, 0x44}}, 0x0) 04:23:25 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, 0x40) 04:23:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = getuid() r1 = geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000003c0)={0x116, 0x7d, 0x2, {{0x0, 0x90, 0x3ff, 0x0, {0x0, 0x1, 0x2}, 0x20090000, 0x1, 0x8, 0x80, 0x9, 'ip6_vti0\x00', 0x12, 'securitywlan0self)', 0x21, 'system_u:object_r:hald_exec_t:s0\x00', 0x21, 'system_u:object_r:hald_exec_t:s0\x00'}, 0x71, '7\xddi\x06\r\xa1\x8c\xc0\x93\xfe\xb1M\xc9\xe4D_:C\v\xa4\xf1\xbc\xe4&/du\xcdb:C\xdb\xa5\xc6-FB\x94\xd30R?\xe3?G\xf8\xd2\r\xc3\x03z\xdf6\xf0A\xdd$\x0e\b|\xad\x88\x91~]\x18y^\x89\xf6\x1e\xf7C+\xd4f2o\x906\xb7\x06N\x9d\x9bc\xdd\xbd\x9bZ`j\xd3\x93\x9cNlgwtQ\x04F\xd1\x97\xba\xb4\"\xcc\xde\x1a\x1c\x99', r1, 0x0, r0}}, 0x116) r2 = getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000300)={0xa5, 0x7d, 0x2, {{0x0, 0x90, 0x3ff, 0x0, {0x0, 0x1, 0x2}, 0x20090000, 0x1, 0x8, 0x80, 0x9, 'ip6_vti0\x00', 0x12, 'securitywlan0self)', 0x21, 'system_u:object_r:hald_exec_t:s0\x00', 0x21, 'system_u:object_r:hald_exec_t:s0\x00'}, 0x0, '', 0x0, 0x0, r2}}, 0xa5) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@overriderock='overriderockperm'}], [{@fowner_lt={'fowner<', r0}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'iso9660\x00'}}, {@subj_type={'subj_type', 0x3d, 'fowner>'}}]}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r3, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x2, 0x2, 0x2, 0xc, 0x80, 0xfffa}, 0x20) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$selinux_user(r5, &(0x7f0000000100)={'system_u:object_r:gpg_exec_t:s0', 0x20, 'system_u\x00'}, 0x29) [ 1404.473202] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1404.485829] FAULT_INJECTION: forcing a failure. [ 1404.485829] name failslab, interval 1, probability 0, space 0, times 0 [ 1404.497410] CPU: 0 PID: 32038 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1404.505307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1404.514672] Call Trace: [ 1404.517295] dump_stack+0x188/0x20d 04:23:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x5000000}, 0x0) [ 1404.520949] should_fail.cold+0xa/0x1b [ 1404.524858] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1404.529977] ? __lock_is_held+0xad/0x140 [ 1404.534062] __should_failslab+0x115/0x180 [ 1404.538313] should_failslab+0x5/0xf [ 1404.542043] kmem_cache_alloc+0x29f/0x710 [ 1404.546209] ? kernfs_add_one+0x377/0x4d0 [ 1404.550372] __kernfs_new_node+0xd2/0x680 [ 1404.554521] ? kernfs_dop_revalidate+0x3b0/0x3b0 [ 1404.559294] ? __mutex_unlock_slowpath+0xea/0x670 [ 1404.564266] ? wait_for_completion+0x3c0/0x3c0 [ 1404.568864] ? kernfs_next_descendant_post+0x27f/0x2c0 [ 1404.574229] kernfs_new_node+0x92/0x120 [ 1404.578226] __kernfs_create_file+0x51/0x33f [ 1404.582636] sysfs_add_file_mode_ns+0x224/0x520 [ 1404.587297] internal_create_group+0x359/0xb90 [ 1404.591878] ? lock_acquire+0x170/0x400 [ 1404.595902] ? remove_files.isra.0+0x190/0x190 [ 1404.600504] ? lock_downgrade+0x740/0x740 [ 1404.606402] lo_ioctl+0xf89/0x20e0 [ 1404.609977] ? lo_rw_aio+0x12f0/0x12f0 [ 1404.613867] blkdev_ioctl+0xbf7/0x1a1c [ 1404.617747] ? blkpg_ioctl+0x9e0/0x9e0 [ 1404.621641] ? mark_held_locks+0xf0/0xf0 [ 1404.625748] ? find_held_lock+0x2d/0x110 [ 1404.629807] ? debug_check_no_obj_freed+0x20a/0x42e [ 1404.634817] block_ioctl+0xe9/0x130 [ 1404.638456] ? blkdev_fallocate+0x3f0/0x3f0 [ 1404.642803] do_vfs_ioctl+0xcda/0x12e0 [ 1404.646778] ? selinux_file_ioctl+0x46c/0x5d0 [ 1404.651284] ? selinux_file_ioctl+0x125/0x5d0 [ 1404.655774] ? check_preemption_disabled+0x41/0x280 [ 1404.660791] ? ioctl_preallocate+0x200/0x200 [ 1404.667122] ? selinux_file_mprotect+0x600/0x600 [ 1404.671878] ? __fget+0x340/0x510 [ 1404.675327] ? iterate_fd+0x350/0x350 [ 1404.679126] ? putname+0xe1/0x120 [ 1404.682608] ? security_file_ioctl+0x6c/0xb0 [ 1404.687120] ksys_ioctl+0x9b/0xc0 [ 1404.690587] __x64_sys_ioctl+0x6f/0xb0 [ 1404.694501] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1404.699090] do_syscall_64+0xf9/0x620 [ 1404.702915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1404.708117] RIP: 0033:0x45c6b7 04:23:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x3700, 0x6}]}, 0x44}}, 0x0) 04:23:25 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}, 0x40) [ 1404.711308] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1404.730199] RSP: 002b:00007ff11ffef9d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1404.737902] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045c6b7 [ 1404.745164] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1404.752422] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1404.759688] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1404.766954] R13: 0000000000000c1b R14: 00000000004c1905 R15: 0000000000000014 04:23:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) syncfs(r2) [ 1404.883100] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:26 executing program 3 (fault-call:0 fault-nth:21): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x3800, 0x6}]}, 0x44}}, 0x0) [ 1405.112623] FAULT_INJECTION: forcing a failure. [ 1405.112623] name failslab, interval 1, probability 0, space 0, times 0 [ 1405.130041] CPU: 1 PID: 32078 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1405.137993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1405.147399] Call Trace: [ 1405.150020] dump_stack+0x188/0x20d [ 1405.153647] should_fail.cold+0xa/0x1b [ 1405.157539] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1405.162634] ? __lock_is_held+0xad/0x140 [ 1405.166695] __should_failslab+0x115/0x180 [ 1405.170920] should_failslab+0x5/0xf [ 1405.174625] kmem_cache_alloc_node+0x260/0x730 [ 1405.179207] ? find_held_lock+0x2d/0x110 [ 1405.183261] __alloc_skb+0xba/0x5b0 [ 1405.186875] ? skb_trim+0x180/0x180 [ 1405.190494] ? check_preemption_disabled+0x41/0x280 [ 1405.195505] alloc_uevent_skb+0x7b/0x210 [ 1405.199557] kobject_uevent_env+0x8f0/0x1160 [ 1405.203965] lo_ioctl+0x1006/0x20e0 [ 1405.207595] ? lo_rw_aio+0x12f0/0x12f0 [ 1405.211473] blkdev_ioctl+0xbf7/0x1a1c [ 1405.215348] ? blkpg_ioctl+0x9e0/0x9e0 [ 1405.219227] ? mark_held_locks+0xf0/0xf0 [ 1405.223281] ? find_held_lock+0x2d/0x110 [ 1405.227332] ? debug_check_no_obj_freed+0x20a/0x42e [ 1405.232353] block_ioctl+0xe9/0x130 [ 1405.235968] ? blkdev_fallocate+0x3f0/0x3f0 [ 1405.240292] do_vfs_ioctl+0xcda/0x12e0 [ 1405.244169] ? selinux_file_ioctl+0x46c/0x5d0 [ 1405.248764] ? selinux_file_ioctl+0x125/0x5d0 [ 1405.253262] ? check_preemption_disabled+0x41/0x280 [ 1405.258289] ? ioctl_preallocate+0x200/0x200 [ 1405.262697] ? selinux_file_mprotect+0x600/0x600 [ 1405.267447] ? __fget+0x340/0x510 [ 1405.270895] ? iterate_fd+0x350/0x350 [ 1405.274687] ? putname+0xe1/0x120 [ 1405.278139] ? security_file_ioctl+0x6c/0xb0 [ 1405.282545] ksys_ioctl+0x9b/0xc0 [ 1405.286009] __x64_sys_ioctl+0x6f/0xb0 [ 1405.289898] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1405.294471] do_syscall_64+0xf9/0x620 [ 1405.298274] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1405.303457] RIP: 0033:0x45c6b7 [ 1405.306648] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1405.325536] RSP: 002b:00007ff11ffef9d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1405.333232] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045c6b7 [ 1405.340488] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1405.347746] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1405.355001] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 04:23:26 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x146) 04:23:26 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, 0x40) 04:23:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x6000000}, 0x0) 04:23:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RRENAMEAT(r1, &(0x7f0000000040)={0x7, 0x4b, 0x1}, 0x7) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x4000, 0x0) r3 = socket(0x80000000000000a, 0x2, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000000)={r5}, 0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000140)={r5, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x15}}}, 0x9, 0xff81}, &(0x7f0000000240)=0x90) 04:23:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x3900, 0x6}]}, 0x44}}, 0x0) [ 1405.362270] R13: 0000000000000c1b R14: 00000000004c1905 R15: 0000000000000015 [ 1405.429842] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:26 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0x40) 04:23:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x3a00, 0x6}]}, 0x44}}, 0x0) 04:23:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x7000000}, 0x0) 04:23:26 executing program 3 (fault-call:0 fault-nth:22): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:26 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x40) 04:23:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x3b00, 0x6}]}, 0x44}}, 0x0) [ 1405.655838] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1405.672364] FAULT_INJECTION: forcing a failure. [ 1405.672364] name failslab, interval 1, probability 0, space 0, times 0 [ 1405.683920] CPU: 0 PID: 32115 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1405.691830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1405.701187] Call Trace: [ 1405.703796] dump_stack+0x188/0x20d [ 1405.707424] should_fail.cold+0xa/0x1b [ 1405.711318] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1405.716425] ? __lock_is_held+0xad/0x140 [ 1405.720489] __should_failslab+0x115/0x180 [ 1405.724713] should_failslab+0x5/0xf [ 1405.728415] kmem_cache_alloc+0x29f/0x710 [ 1405.732563] ? lock_downgrade+0x740/0x740 [ 1405.736703] skb_clone+0x14f/0x3d0 [ 1405.740240] netlink_broadcast_filtered+0x889/0xb50 [ 1405.745260] netlink_broadcast+0x35/0x40 [ 1405.749402] kobject_uevent_env+0x8b6/0x1160 [ 1405.753812] lo_ioctl+0x1006/0x20e0 [ 1405.757434] ? lo_rw_aio+0x12f0/0x12f0 [ 1405.761329] blkdev_ioctl+0xbf7/0x1a1c [ 1405.765255] ? blkpg_ioctl+0x9e0/0x9e0 [ 1405.769164] ? mark_held_locks+0xf0/0xf0 [ 1405.773225] ? find_held_lock+0x2d/0x110 [ 1405.777308] ? debug_check_no_obj_freed+0x20a/0x42e [ 1405.782433] block_ioctl+0xe9/0x130 [ 1405.786055] ? blkdev_fallocate+0x3f0/0x3f0 [ 1405.790372] do_vfs_ioctl+0xcda/0x12e0 [ 1405.794255] ? selinux_file_ioctl+0x46c/0x5d0 [ 1405.798754] ? selinux_file_ioctl+0x125/0x5d0 [ 1405.803243] ? check_preemption_disabled+0x41/0x280 [ 1405.808248] ? ioctl_preallocate+0x200/0x200 [ 1405.812646] ? selinux_file_mprotect+0x600/0x600 [ 1405.817399] ? __fget+0x340/0x510 [ 1405.820855] ? iterate_fd+0x350/0x350 [ 1405.824658] ? putname+0xe1/0x120 [ 1405.828110] ? security_file_ioctl+0x6c/0xb0 [ 1405.832508] ksys_ioctl+0x9b/0xc0 [ 1405.835964] __x64_sys_ioctl+0x6f/0xb0 [ 1405.839841] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1405.844426] do_syscall_64+0xf9/0x620 [ 1405.848221] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1405.853410] RIP: 0033:0x45c6b7 [ 1405.856593] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1405.875484] RSP: 002b:00007ff11ffef9d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1405.883618] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045c6b7 [ 1405.890880] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1405.898175] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a 04:23:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x8000000}, 0x0) [ 1405.905430] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1405.912690] R13: 0000000000000c1b R14: 00000000004c1905 R15: 0000000000000016 04:23:27 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x147) 04:23:27 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}, 0x40) 04:23:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x3c00, 0x6}]}, 0x44}}, 0x0) 04:23:27 executing program 3 (fault-call:0 fault-nth:23): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0xa000000}, 0x0) 04:23:27 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}}, 0x40) 04:23:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x3d00, 0x6}]}, 0x44}}, 0x0) [ 1406.382978] FAULT_INJECTION: forcing a failure. [ 1406.382978] name failslab, interval 1, probability 0, space 0, times 0 04:23:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0xe000000}, 0x0) [ 1406.470710] CPU: 0 PID: 32141 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1406.478654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1406.488016] Call Trace: [ 1406.490626] dump_stack+0x188/0x20d [ 1406.494270] should_fail.cold+0xa/0x1b [ 1406.498177] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1406.503290] ? __lock_is_held+0xad/0x140 [ 1406.507397] __should_failslab+0x115/0x180 [ 1406.511647] should_failslab+0x5/0xf [ 1406.515368] kmem_cache_alloc_node_trace+0x272/0x750 [ 1406.520498] __kmalloc_node_track_caller+0x38/0x70 [ 1406.525460] __kmalloc_reserve.isra.0+0x39/0xe0 [ 1406.530158] __alloc_skb+0xef/0x5b0 [ 1406.533920] ? skb_trim+0x180/0x180 [ 1406.537577] ? check_preemption_disabled+0x41/0x280 [ 1406.542626] alloc_uevent_skb+0x7b/0x210 [ 1406.546706] kobject_uevent_env+0x8f0/0x1160 [ 1406.551138] lo_ioctl+0x1006/0x20e0 [ 1406.554785] ? lo_rw_aio+0x12f0/0x12f0 [ 1406.558690] blkdev_ioctl+0xbf7/0x1a1c [ 1406.562592] ? blkpg_ioctl+0x9e0/0x9e0 [ 1406.566499] ? mark_held_locks+0xf0/0xf0 [ 1406.570586] ? find_held_lock+0x2d/0x110 [ 1406.574666] ? debug_check_no_obj_freed+0x20a/0x42e [ 1406.579702] block_ioctl+0xe9/0x130 [ 1406.583345] ? blkdev_fallocate+0x3f0/0x3f0 [ 1406.587690] do_vfs_ioctl+0xcda/0x12e0 [ 1406.591603] ? selinux_file_ioctl+0x46c/0x5d0 [ 1406.597842] ? selinux_file_ioctl+0x125/0x5d0 [ 1406.602362] ? check_preemption_disabled+0x41/0x280 [ 1406.607403] ? ioctl_preallocate+0x200/0x200 [ 1406.611853] ? selinux_file_mprotect+0x600/0x600 [ 1406.616628] ? __fget+0x340/0x510 [ 1406.620108] ? iterate_fd+0x350/0x350 [ 1406.623933] ? putname+0xe1/0x120 [ 1406.627415] ? security_file_ioctl+0x6c/0xb0 [ 1406.631868] ksys_ioctl+0x9b/0xc0 [ 1406.635345] __x64_sys_ioctl+0x6f/0xb0 [ 1406.639261] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1406.643860] do_syscall_64+0xf9/0x620 [ 1406.647679] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1406.652882] RIP: 0033:0x45c6b7 [ 1406.656089] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1406.675006] RSP: 002b:00007ff11ffef9d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1406.682734] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045c6b7 [ 1406.690020] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1406.697325] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1406.704607] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1406.711905] R13: 0000000000000c1b R14: 00000000004c1905 R15: 0000000000000017 04:23:27 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, 0x40) [ 1406.799585] nla_parse: 2 callbacks suppressed [ 1406.799596] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:28 executing program 3 (fault-call:0 fault-nth:24): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x3e00, 0x6}]}, 0x44}}, 0x0) 04:23:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0xf000000}, 0x0) [ 1406.954347] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1406.996959] FAULT_INJECTION: forcing a failure. [ 1406.996959] name failslab, interval 1, probability 0, space 0, times 0 [ 1407.057471] CPU: 0 PID: 32166 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1407.065493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1407.074855] Call Trace: [ 1407.077453] dump_stack+0x188/0x20d [ 1407.081082] should_fail.cold+0xa/0x1b [ 1407.084970] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1407.090071] ? __lock_is_held+0xad/0x140 [ 1407.094135] __should_failslab+0x115/0x180 [ 1407.098360] should_failslab+0x5/0xf [ 1407.102062] kmem_cache_alloc_trace+0x2c6/0x7a0 [ 1407.106745] ? disk_part_iter_exit+0x43/0x80 [ 1407.111147] ? drop_partitions.isra.0.part.0+0xd6/0x120 [ 1407.116500] check_partition+0x4e/0x6b4 [ 1407.120465] ? check_disk_size_change+0x9f/0x150 [ 1407.125212] rescan_partitions+0x21d/0x990 [ 1407.129433] ? cap_capable+0x1eb/0x250 [ 1407.133444] __blkdev_reread_part+0x19d/0x220 [ 1407.137958] blkdev_reread_part+0x23/0x40 [ 1407.142109] loop_reread_partitions+0x19/0x40 [ 1407.146597] loop_set_status+0xe39/0x1370 [ 1407.150737] ? _copy_from_user+0xd2/0x140 [ 1407.154876] loop_set_status64+0xb2/0x110 [ 1407.159012] ? loop_set_status_old+0x310/0x310 [ 1407.163585] ? avc_has_extended_perms+0x841/0x1030 [ 1407.168523] ? avc_ss_reset+0x180/0x180 [ 1407.172491] lo_ioctl+0x41f/0x20e0 [ 1407.176047] ? lo_rw_aio+0x12f0/0x12f0 [ 1407.179950] blkdev_ioctl+0xbf7/0x1a1c [ 1407.183844] ? blkpg_ioctl+0x9e0/0x9e0 [ 1407.187742] ? mark_held_locks+0xf0/0xf0 [ 1407.191807] ? find_held_lock+0x2d/0x110 [ 1407.195881] ? debug_check_no_obj_freed+0x20a/0x42e [ 1407.200901] block_ioctl+0xe9/0x130 [ 1407.204528] ? blkdev_fallocate+0x3f0/0x3f0 [ 1407.208849] do_vfs_ioctl+0xcda/0x12e0 [ 1407.212730] ? selinux_file_ioctl+0x46c/0x5d0 [ 1407.217216] ? selinux_file_ioctl+0x125/0x5d0 [ 1407.221703] ? check_preemption_disabled+0x41/0x280 [ 1407.226710] ? ioctl_preallocate+0x200/0x200 [ 1407.231113] ? selinux_file_mprotect+0x600/0x600 [ 1407.235869] ? __fget+0x340/0x510 [ 1407.239323] ? iterate_fd+0x350/0x350 [ 1407.243113] ? putname+0xe1/0x120 [ 1407.246572] ? security_file_ioctl+0x6c/0xb0 [ 1407.250975] ksys_ioctl+0x9b/0xc0 [ 1407.254432] __x64_sys_ioctl+0x6f/0xb0 [ 1407.258313] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1407.262885] do_syscall_64+0xf9/0x620 [ 1407.266696] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1407.271874] RIP: 0033:0x45c6b7 [ 1407.275072] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1407.293977] RSP: 002b:00007ff11ffef9d8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 04:23:28 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x148) 04:23:28 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}}, 0x40) 04:23:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x3f00, 0x6}]}, 0x44}}, 0x0) 04:23:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x20000000}, 0x0) [ 1407.301679] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045c6b7 [ 1407.308947] RDX: 00007ff11ffefac0 RSI: 0000000000004c04 RDI: 0000000000000005 [ 1407.316205] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1407.323469] R10: 0000000000000075 R11: 0000000000000202 R12: 0000000000000003 [ 1407.330730] R13: 0000000000000c1b R14: 00000000004c1905 R15: 0000000000000018 04:23:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x4000, 0x6}]}, 0x44}}, 0x0) [ 1407.410463] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:28 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}}, 0x40) 04:23:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x21160000}, 0x0) 04:23:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x4100, 0x6}]}, 0x44}}, 0x0) 04:23:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x48000000}, 0x0) [ 1407.541851] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1407.654571] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:29 executing program 3 (fault-call:0 fault-nth:25): syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:29 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}}, 0x40) 04:23:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x4200, 0x6}]}, 0x44}}, 0x0) 04:23:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x4c000000}, 0x0) 04:23:29 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x149) 04:23:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x4300, 0x6}]}, 0x44}}, 0x0) [ 1408.376262] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:29 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}}, 0x40) [ 1408.428491] FAULT_INJECTION: forcing a failure. [ 1408.428491] name failslab, interval 1, probability 0, space 0, times 0 [ 1408.461532] CPU: 1 PID: 32209 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1408.469564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1408.479106] Call Trace: [ 1408.481722] dump_stack+0x188/0x20d [ 1408.485381] should_fail.cold+0xa/0x1b [ 1408.489386] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1408.494515] ? __lock_is_held+0xad/0x140 [ 1408.498601] __should_failslab+0x115/0x180 [ 1408.502857] should_failslab+0x5/0xf [ 1408.507024] kmem_cache_alloc_node_trace+0x272/0x750 [ 1408.512148] ? find_held_lock+0x2d/0x110 [ 1408.516236] ? fs_reclaim_acquire+0x10/0x10 [ 1408.520570] ? should_fail+0x142/0x7bc [ 1408.524480] __get_vm_area_node+0x128/0x3a0 [ 1408.528913] __vmalloc_node_range+0xd8/0x790 [ 1408.533340] ? check_partition+0x131/0x6b4 [ 1408.537598] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1408.542629] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1408.547485] ? check_partition+0x131/0x6b4 [ 1408.551730] vzalloc+0x67/0x80 [ 1408.554938] ? check_partition+0x131/0x6b4 [ 1408.559187] check_partition+0x131/0x6b4 [ 1408.563263] ? check_disk_size_change+0x9f/0x150 [ 1408.568034] rescan_partitions+0x21d/0x990 [ 1408.572279] ? cap_capable+0x1eb/0x250 [ 1408.576199] __blkdev_reread_part+0x19d/0x220 [ 1408.580709] blkdev_reread_part+0x23/0x40 [ 1408.584889] loop_reread_partitions+0x19/0x40 [ 1408.589415] loop_set_status+0xe39/0x1370 [ 1408.593583] ? _copy_from_user+0xd2/0x140 [ 1408.597746] loop_set_status64+0xb2/0x110 [ 1408.601905] ? loop_set_status_old+0x310/0x310 [ 1408.606502] ? avc_has_extended_perms+0x841/0x1030 [ 1408.611480] ? avc_ss_reset+0x180/0x180 [ 1408.615471] lo_ioctl+0x41f/0x20e0 [ 1408.619029] ? lo_rw_aio+0x12f0/0x12f0 [ 1408.622929] blkdev_ioctl+0xbf7/0x1a1c [ 1408.626832] ? blkpg_ioctl+0x9e0/0x9e0 [ 1408.630735] ? mark_held_locks+0xf0/0xf0 [ 1408.634817] ? find_held_lock+0x2d/0x110 [ 1408.638892] ? debug_check_no_obj_freed+0x20a/0x42e [ 1408.643931] block_ioctl+0xe9/0x130 [ 1408.647568] ? blkdev_fallocate+0x3f0/0x3f0 [ 1408.651902] do_vfs_ioctl+0xcda/0x12e0 [ 1408.655803] ? selinux_file_ioctl+0x46c/0x5d0 [ 1408.660310] ? selinux_file_ioctl+0x125/0x5d0 [ 1408.664818] ? check_preemption_disabled+0x41/0x280 [ 1408.669850] ? ioctl_preallocate+0x200/0x200 [ 1408.674281] ? selinux_file_mprotect+0x600/0x600 [ 1408.679057] ? __fget+0x340/0x510 [ 1408.682526] ? iterate_fd+0x350/0x350 [ 1408.686335] ? putname+0xe1/0x120 [ 1408.689818] ? security_file_ioctl+0x6c/0xb0 [ 1408.694247] ksys_ioctl+0x9b/0xc0 [ 1408.697717] __x64_sys_ioctl+0x6f/0xb0 [ 1408.701618] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1408.706214] do_syscall_64+0xf9/0x620 [ 1408.710032] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1408.715227] RIP: 0033:0x45c6b7 [ 1408.718454] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1408.737486] RSP: 002b:00007ff11ffef9d8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 [ 1408.745211] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045c6b7 [ 1408.752498] RDX: 00007ff11ffefac0 RSI: 0000000000004c04 RDI: 0000000000000005 [ 1408.759873] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1408.767154] R10: 0000000000000075 R11: 0000000000000202 R12: 0000000000000003 [ 1408.774433] R13: 0000000000000c1b R14: 00000000004c1905 R15: 0000000000000019 [ 1408.833190] syz-executor.3: vmalloc: allocation failure: 32768 bytes, mode:0x6080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 1408.862605] syz-executor.3 cpuset=syz3 mems_allowed=0-1 04:23:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x60000000}, 0x0) [ 1408.883118] CPU: 1 PID: 32209 Comm: syz-executor.3 Not tainted 4.19.112-syzkaller #0 [ 1408.891049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1408.900415] Call Trace: [ 1408.903022] dump_stack+0x188/0x20d [ 1408.906674] warn_alloc.cold+0x7b/0x173 [ 1408.910668] ? zone_watermark_ok_safe+0x260/0x260 [ 1408.915525] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1408.920562] ? fs_reclaim_acquire+0x10/0x10 [ 1408.924905] ? should_fail+0x142/0x7bc [ 1408.928816] ? __get_vm_area_node+0x2df/0x3a0 04:23:30 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}, 0x40) 04:23:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x4400, 0x6}]}, 0x44}}, 0x0) [ 1408.933332] __vmalloc_node_range+0x499/0x790 [ 1408.937857] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1408.942893] ? kmem_cache_alloc_trace+0x342/0x7a0 [ 1408.947760] ? check_partition+0x131/0x6b4 [ 1408.952017] vzalloc+0x67/0x80 [ 1408.955226] ? check_partition+0x131/0x6b4 [ 1408.959479] check_partition+0x131/0x6b4 [ 1408.963559] ? check_disk_size_change+0x9f/0x150 [ 1408.968332] rescan_partitions+0x21d/0x990 [ 1408.972578] ? cap_capable+0x1eb/0x250 [ 1408.976493] __blkdev_reread_part+0x19d/0x220 [ 1408.981013] blkdev_reread_part+0x23/0x40 [ 1408.985186] loop_reread_partitions+0x19/0x40 [ 1408.989705] loop_set_status+0xe39/0x1370 [ 1408.993872] ? _copy_from_user+0xd2/0x140 [ 1408.998044] loop_set_status64+0xb2/0x110 [ 1409.002208] ? loop_set_status_old+0x310/0x310 [ 1409.006801] ? avc_has_extended_perms+0x841/0x1030 [ 1409.011771] ? avc_ss_reset+0x180/0x180 [ 1409.015762] lo_ioctl+0x41f/0x20e0 [ 1409.019328] ? lo_rw_aio+0x12f0/0x12f0 [ 1409.023239] blkdev_ioctl+0xbf7/0x1a1c [ 1409.027140] ? blkpg_ioctl+0x9e0/0x9e0 [ 1409.031046] ? mark_held_locks+0xf0/0xf0 [ 1409.035123] ? find_held_lock+0x2d/0x110 [ 1409.039471] ? debug_check_no_obj_freed+0x20a/0x42e [ 1409.044514] block_ioctl+0xe9/0x130 [ 1409.048148] ? blkdev_fallocate+0x3f0/0x3f0 [ 1409.052499] do_vfs_ioctl+0xcda/0x12e0 [ 1409.056403] ? selinux_file_ioctl+0x46c/0x5d0 [ 1409.060918] ? selinux_file_ioctl+0x125/0x5d0 [ 1409.065426] ? check_preemption_disabled+0x41/0x280 [ 1409.070475] ? ioctl_preallocate+0x200/0x200 [ 1409.074906] ? selinux_file_mprotect+0x600/0x600 [ 1409.079679] ? __fget+0x340/0x510 [ 1409.083147] ? iterate_fd+0x350/0x350 [ 1409.086966] ? putname+0xe1/0x120 [ 1409.090538] ? security_file_ioctl+0x6c/0xb0 [ 1409.094967] ksys_ioctl+0x9b/0xc0 [ 1409.098443] __x64_sys_ioctl+0x6f/0xb0 [ 1409.102349] ? lockdep_hardirqs_on+0x40b/0x5d0 [ 1409.106947] do_syscall_64+0xf9/0x620 [ 1409.110774] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1409.115976] RIP: 0033:0x45c6b7 [ 1409.119184] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1409.138102] RSP: 002b:00007ff11ffef9d8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 [ 1409.145832] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045c6b7 [ 1409.153348] RDX: 00007ff11ffefac0 RSI: 0000000000004c04 RDI: 0000000000000005 [ 1409.160734] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1409.168016] R10: 0000000000000075 R11: 0000000000000202 R12: 0000000000000003 [ 1409.175321] R13: 0000000000000c1b R14: 00000000004c1905 R15: 0000000000000019 [ 1409.254721] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x4500, 0x6}]}, 0x44}}, 0x0) 04:23:30 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x14a) [ 1409.301633] Mem-Info: [ 1409.304238] active_anon:253744 inactive_anon:204 isolated_anon:0 [ 1409.304238] active_file:14286 inactive_file:36288 isolated_file:0 [ 1409.304238] unevictable:0 dirty:132 writeback:0 unstable:0 [ 1409.304238] slab_reclaimable:16414 slab_unreclaimable:118551 [ 1409.304238] mapped:60796 shmem:260 pagetables:1704 bounce:0 [ 1409.304238] free:1084380 free_pcp:611 free_cma:0 [ 1409.373594] Node 0 active_anon:1016936kB inactive_anon:816kB active_file:57000kB inactive_file:145152kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:243184kB dirty:528kB writeback:0kB shmem:1040kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 485376kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1409.449024] Node 1 active_anon:0kB inactive_anon:0kB active_file:144kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1409.530741] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1409.596588] lowmem_reserve[]: 0 2533 2535 2535 2535 [ 1409.612867] Node 0 DMA32 free:538796kB min:36064kB low:45080kB high:54096kB active_anon:1016936kB inactive_anon:816kB active_file:57000kB inactive_file:145152kB unevictable:0kB writepending:528kB present:3129332kB managed:2597388kB mlocked:0kB kernel_stack:8288kB pagetables:6816kB bounce:0kB free_pcp:2404kB local_pcp:1272kB free_cma:0kB [ 1409.691904] lowmem_reserve[]: 0 0 1 1 1 [ 1409.703603] Node 0 Normal free:8kB min:24kB low:28kB high:32kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:1908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1409.742931] lowmem_reserve[]: 0 0 0 0 0 [ 1409.755057] Node 1 Normal free:3780180kB min:53796kB low:67244kB high:80692kB active_anon:0kB inactive_anon:0kB active_file:144kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870168kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1409.795211] lowmem_reserve[]: 0 0 0 0 0 [ 1409.808382] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1409.832145] Node 0 DMA32: 5261*4kB (UME) 433*8kB (UME) 42*16kB (UME) 146*32kB (UME) 232*64kB (UME) 196*128kB (UME) 86*256kB (UME) 61*512kB (UME) 30*1024kB (UM) 12*2048kB (UM) 88*4096kB (UM) = 538780kB [ 1409.850870] Node 0 Normal: 0*4kB 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8kB [ 1409.862455] Node 1 Normal: 65*4kB (UME) 254*8kB (UME) 274*16kB (UE) 64*32kB (UE) 17*64kB (UM) 10*128kB (U) 7*256kB (UME) 6*512kB (UME) 2*1024kB (M) 1*2048kB (U) 918*4096kB (M) = 3780180kB [ 1409.880785] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1409.890052] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1409.899062] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1409.908359] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1409.917021] 50832 total pagecache pages [ 1409.921615] 0 pages in swap cache [ 1409.925155] Swap cache stats: add 0, delete 0, find 0/0 [ 1409.930977] Free swap = 0kB [ 1409.934076] Total swap = 0kB [ 1409.937322] 1965979 pages RAM [ 1409.941868] 0 pages HighMem/MovableOnly [ 1409.950640] 344636 pages reserved [ 1409.959683] 0 pages cma reserved 04:23:31 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x68000000}, 0x0) 04:23:31 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}}, 0x40) 04:23:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x4600, 0x6}]}, 0x44}}, 0x0) 04:23:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x6c000000}, 0x0) [ 1410.059179] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x4700, 0x6}]}, 0x44}}, 0x0) 04:23:31 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}}, 0x40) 04:23:31 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x14b) 04:23:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x4800, 0x6}]}, 0x44}}, 0x0) [ 1410.196215] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x74000000}, 0x0) 04:23:31 executing program 3: syz_read_part_table(0x2, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:31 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13}}, 0x40) 04:23:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x4900, 0x6}]}, 0x44}}, 0x0) [ 1410.403725] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x7a000000}, 0x0) 04:23:31 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14}}, 0x40) 04:23:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x4a00, 0x6}]}, 0x44}}, 0x0) 04:23:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x7fffef90}, 0x0) 04:23:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x4b00, 0x6}]}, 0x44}}, 0x0) 04:23:31 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}}, 0x40) 04:23:32 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x14c) 04:23:32 executing program 3: syz_read_part_table(0x3, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x4c00, 0x6}]}, 0x44}}, 0x0) 04:23:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x7ffff000}, 0x0) 04:23:32 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16}}, 0x40) 04:23:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x4d00, 0x6}]}, 0x44}}, 0x0) 04:23:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x90efff7f}, 0x0) 04:23:32 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17}}, 0x40) 04:23:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x4e00, 0x6}]}, 0x44}}, 0x0) 04:23:32 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}}, 0x40) 04:23:32 executing program 3: syz_read_part_table(0x4, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x97ffffff}, 0x0) 04:23:33 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x14d) 04:23:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19}}, 0x40) 04:23:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x4f00, 0x6}]}, 0x44}}, 0x0) 04:23:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x9effffff}, 0x0) 04:23:33 executing program 3: syz_read_part_table(0x5, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 1412.074910] nla_parse: 5 callbacks suppressed [ 1412.074920] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x5000, 0x6}]}, 0x44}}, 0x0) 04:23:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a}}, 0x40) 04:23:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x5100, 0x6}]}, 0x44}}, 0x0) 04:23:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0xf0ffffff}, 0x0) 04:23:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b}}, 0x40) 04:23:33 executing program 3: syz_read_part_table(0x6, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x5200, 0x6}]}, 0x44}}, 0x0) [ 1412.431823] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1412.504928] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:34 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x14e) 04:23:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c}}, 0x40) 04:23:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0xf5ffffff}, 0x0) 04:23:34 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x5300, 0x6}]}, 0x44}}, 0x0) 04:23:34 executing program 3: syz_read_part_table(0x7, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 1413.012120] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0xfcffffff}, 0x0) 04:23:34 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x5400, 0x6}]}, 0x44}}, 0x0) 04:23:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d}}, 0x40) 04:23:34 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x5500, 0x6}]}, 0x44}}, 0x0) 04:23:34 executing program 3: syz_read_part_table(0x9, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 1413.276834] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e}}, 0x40) 04:23:34 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x5600, 0x6}]}, 0x44}}, 0x0) 04:23:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21}}, 0x40) 04:23:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0xfffff000}, 0x0) 04:23:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x5700, 0x6}]}, 0x44}}, 0x0) 04:23:35 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x14f) 04:23:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f0000000240)={0x400, 0xa, 0x4, 0x80000, 0x400, {0x77359400}, {0x4, 0x1, 0x0, 0x0, 0x71, 0x40, "53fff197"}, 0x9, 0x1, @offset=0x8, 0x4, 0x0, r0}) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x11, r7, 0x0) r9 = socket$kcm(0x29, 0x5, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000001740)={0x154, 0x0, &(0x7f00000005c0)=[@release, @transaction={0x40406300, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000100)={@flat=@weak_handle={0x77682a85, 0x10a}, @flat=@weak_handle={0x77682a85, 0xa, 0x3}, @ptr={0x70742a85, 0x1, &(0x7f0000000040)=""/25, 0x19, 0x0, 0x3e}}, &(0x7f0000000180)={0x0, 0x18, 0x30}}}, @reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x48, 0x18, &(0x7f00000002c0)={@flat=@weak_handle={0x77682a85, 0x1, 0x1}, @flat=@binder={0x73622a85, 0x1100}, @fd={0x66642a85, 0x0, r5}}, &(0x7f00000001c0)={0x0, 0x18, 0x30}}}, @free_buffer={0x40086303, r8}, @acquire={0x40046305, 0x3}, @reply={0x40406301, {0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000340)={@fda={0x66646185, 0x3, 0x1, 0x3d}, @fd={0x66642a85, 0x0, r9}, @fd={0x66642a85, 0x0, r1}}, &(0x7f00000003c0)={0x0, 0x20, 0x38}}}, @increfs={0x40046304, 0x2}, @reply_sg={0x40486312, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000500)={@fda={0x66646185, 0x4, 0x1, 0x2c}, @flat=@weak_binder={0x77622a85, 0x1000, 0x1}, @ptr={0x70742a85, 0x0, &(0x7f0000000400)=""/204, 0xcc, 0x0, 0x22}}, &(0x7f0000000580)={0x0, 0x20, 0x38}}, 0x1000}, @request_death={0x400c630e, 0x2}], 0x1000, 0x0, &(0x7f0000000740)="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"}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) 04:23:35 executing program 3: syz_read_part_table(0x10, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22}}, 0x40) 04:23:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x5800, 0x6}]}, 0x44}}, 0x0) [ 1413.966540] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0xffffff7f}, 0x0) 04:23:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f0000000040), &(0x7f0000000100)=0x8) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) r3 = syz_open_procfs(r2, &(0x7f0000000140)='mountstats\x00') connect$caif(r3, &(0x7f0000000180), 0x18) 04:23:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x5900, 0x6}]}, 0x44}}, 0x0) 04:23:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23}}, 0x40) [ 1414.153060] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) statx(r3, &(0x7f0000000040)='./file0\x00', 0x0, 0x10, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xee01, r4) fstatfs(r0, &(0x7f0000000100)=""/92) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) 04:23:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0xffffff97}, 0x0) 04:23:35 executing program 3: syz_read_part_table(0x23, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 1414.304231] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:35 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x150) 04:23:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x5a00, 0x6}]}, 0x44}}, 0x0) 04:23:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}}, 0x40) 04:23:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000100)=0x8) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) 04:23:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0xffffff9e}, 0x0) 04:23:35 executing program 3: syz_read_part_table(0x2a, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x5b00, 0x6}]}, 0x44}}, 0x0) [ 1414.874905] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SVE_GET_VL(0x33, 0x18f17) r1 = fcntl$dupfd(r0, 0x0, r0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0xe201, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6f76887272696465726f636b7065726d2d00"]) 04:23:36 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}}, 0x40) 04:23:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0xfffffff0}, 0x0) 04:23:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x5c00, 0x6}]}, 0x44}}, 0x0) 04:23:36 executing program 0: r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000040), 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x1, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004004}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) [ 1415.055242] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:36 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x151) 04:23:36 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26}}, 0x40) 04:23:36 executing program 3: syz_read_part_table(0x48, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0xfffffff5}, 0x0) 04:23:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x5d00, 0x6}]}, 0x44}}, 0x0) 04:23:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r1, 0x113, 0x1, &(0x7f0000000040), 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000040)=0x5, &(0x7f0000000100)=0x4) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) 04:23:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x5e00, 0x6}]}, 0x44}}, 0x0) 04:23:37 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}}, 0x40) 04:23:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0xfffffffc}, 0x0) 04:23:37 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28}}, 0x40) 04:23:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) r3 = dup3(r1, r2, 0x80000) socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r4, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) r5 = dup(r3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r6, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCDELDLCI(r6, 0x8981, &(0x7f0000000180)={'veth1\x00', 0x7}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000100)) r7 = fcntl$dupfd(r0, 0x0, r0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x400, &(0x7f0000000240)=ANY=[@ANYBLOB="6e6f01010000000000008e474ad6145da7fb99291f20e9822afb30672adbdb800666b09cb55fbb0e55c410f7a2c7cf85712e13271b6f34aabbd5de8fb02a5d25c82cffe480284f562b9b93a9a07406a24f4fefacafe5e3e1"]) 04:23:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x5f00, 0x6}]}, 0x44}}, 0x0) 04:23:37 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x152) 04:23:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0xffffffff}, 0x0) 04:23:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x6000, 0x6}]}, 0x44}}, 0x0) 04:23:37 executing program 3: syz_read_part_table(0x4c, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:37 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29}}, 0x40) 04:23:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getcwd(&(0x7f0000000100)=""/149, 0x95) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) ioctl$SNDCTL_DSP_SETTRIGGER(r1, 0x40045010, &(0x7f0000000040)=0x2) 04:23:37 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a}}, 0x40) 04:23:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x6100, 0x6}]}, 0x44}}, 0x0) 04:23:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x2) 04:23:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000040)={0x2, 0xe9}, 0x2) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r5, 0xc0045540, &(0x7f0000000100)=0x101) 04:23:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b}}, 0x40) 04:23:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x6200, 0x6}]}, 0x44}}, 0x0) 04:23:38 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x153) 04:23:38 executing program 3: syz_read_part_table(0x55, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x3) 04:23:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000040)='./file1\x00', 0x8e, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYPTR64, @ANYRES64=r1, @ANYRES64]) 04:23:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x6300, 0x6}]}, 0x44}}, 0x0) 04:23:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c}}, 0x40) 04:23:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x4) 04:23:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x6400, 0x6}]}, 0x44}}, 0x0) 04:23:38 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(r1, 0xc01864ba, &(0x7f0000000040)={0x214ad5ab, 0x9, 0x54, 0xfbfbfbfb}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000000)) 04:23:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d}}, 0x40) 04:23:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e}}, 0x40) 04:23:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x6500, 0x6}]}, 0x44}}, 0x0) [ 1417.765588] nla_parse: 4 callbacks suppressed [ 1417.765598] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:39 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x154) 04:23:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000000140)={{0x1, 0x1, 0x7, 0x2, 0x25}}) write$eventfd(r4, &(0x7f0000000100)=0x4, 0x8) r5 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x9, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r5, 0x4018aee3, &(0x7f0000000240)={0x0, 0x10001, 0x10000, &(0x7f00000001c0)=0x2f0}) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KVM_NMI(r7, 0xae9a) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) 04:23:39 executing program 3: syz_read_part_table(0x68, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x5) 04:23:39 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f}}, 0x40) 04:23:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x6600, 0x6}]}, 0x44}}, 0x0) 04:23:39 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30}}, 0x40) 04:23:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x6) 04:23:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x6700, 0x6}]}, 0x44}}, 0x0) 04:23:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000180)) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x20000, 0x0) ioctl$SG_SET_DEBUG(r4, 0x227e, &(0x7f0000000140)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400003) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]) 04:23:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x6800, 0x6}]}, 0x44}}, 0x0) 04:23:39 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31}}, 0x40) [ 1418.675394] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:40 executing program 3: syz_read_part_table(0x6c, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x7) 04:23:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@overriderock='overriderockperm'}]}) 04:23:40 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x155) 04:23:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x6900, 0x6}]}, 0x44}}, 0x0) 04:23:40 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32}}, 0x40) 04:23:40 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33}}, 0x40) 04:23:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x6a00, 0x6}]}, 0x44}}, 0x0) 04:23:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x8) 04:23:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f0000000240)=""/4096) read$snddsp(r1, &(0x7f0000000100)=""/181, 0xb5) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="ef76657a72696465726f636b7065726d2c0037311f56b3fe511d9d900daa0b7501570130688550f17241d95c7a4437d2d0adbaccbb701bc9412f7eee312fe911baae3d0aa063991bd5de90d8e5b9ebccb4576508000000006b3da6608a1395ab7462149fe207fcdd879e8a09e631d3af404f83d9f7281869"]) 04:23:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x6b00, 0x6}]}, 0x44}}, 0x0) 04:23:40 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34}}, 0x40) [ 1419.647515] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:40 executing program 3: syz_read_part_table(0x74, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x6c00, 0x6}]}, 0x44}}, 0x0) 04:23:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xa) [ 1419.847143] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1419.867674] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:41 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x156) 04:23:41 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x35}}, 0x40) 04:23:41 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x6d00, 0x6}]}, 0x44}}, 0x0) 04:23:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xe) 04:23:41 executing program 3: syz_read_part_table(0x7a, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:41 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36}}, 0x40) [ 1420.355246] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='overrid\x00rockperm,\x00']) 04:23:41 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x6e00, 0x6}]}, 0x44}}, 0x0) 04:23:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xf) 04:23:41 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37}}, 0x40) 04:23:41 executing program 3: syz_read_part_table(0x300, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:41 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x6f00, 0x6}]}, 0x44}}, 0x0) 04:23:42 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x157) 04:23:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x48) 04:23:42 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}}, 0x40) 04:23:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x7000, 0x6}]}, 0x44}}, 0x0) 04:23:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x206000, &(0x7f0000000000)=ANY=[@ANYBLOB="6f766572726902000000636b7065726d2c00"]) 04:23:42 executing program 3: syz_read_part_table(0x500, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 1421.852365] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:43 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39}}, 0x40) 04:23:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_ENDIAN(0x14, 0x1) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x2) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) r4 = syz_open_procfs$namespace(r3, &(0x7f0000000140)='ns/ipc\x00') sendmsg$RDMA_NLDEV_CMD_SYS_SET(r2, &(0x7f0000000440)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x1407, 0x20, 0x70bd2c, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48040}, 0x14004045) 04:23:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x7100, 0x6}]}, 0x44}}, 0x0) 04:23:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x4c) 04:23:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x7200, 0x6}]}, 0x44}}, 0x0) [ 1422.018462] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:43 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a}}, 0x40) 04:23:43 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x158) 04:23:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x60) 04:23:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 04:23:43 executing program 3: syz_read_part_table(0x600, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x7300, 0x6}]}, 0x44}}, 0x0) 04:23:43 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b}}, 0x40) 04:23:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x7400, 0x6}]}, 0x44}}, 0x0) 04:23:44 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c}}, 0x40) [ 1422.778772] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000100)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000240)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="6f766572724997ecb1dfa16898c4f7ee8ce893562652d74565ab6135259b49113f61e3c6cf006e23ccd41030fc62e5a8f6c1968c693d534d55d16f236e6852def31fa3aed120c75f21d6e6c2b42de42cf405415a29a47cb0146d5c3052793fc2abfa63be79bbd9d7cf9b685db5f7236038801daadd56d43162c83a3765d14cce3b541b82bfbdab58828a39e83971145126baf1a99c710bdbb2404daedfa084d9f1a8175f5f9d3e130000000000000009e72bad45ab77e187659620f2000ec197589b77462432b30b66ef7bd2e2490a300ed61367286b7854b51ff7ec5a20977658130022224e62ab38c43bba24b52572d7b22793277e0000"]) r3 = socket(0x0, 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r4 = socket(0x5, 0x1, 0x0) getsockopt$PNPIPE_ENCAP(r4, 0x113, 0x1, &(0x7f0000000040), 0x0) r5 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r5, 0x113, 0x1, &(0x7f0000000040), 0x0) r6 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r6, 0x113, 0x1, &(0x7f0000000040), 0x0) r7 = socket(0x10, 0x800, 0x8) getsockopt$PNPIPE_ENCAP(r7, 0x113, 0x1, &(0x7f0000000040), 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x800, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000280), 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000140)=0xffffffff, 0x4) 04:23:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x68) 04:23:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x7500, 0x6}]}, 0x44}}, 0x0) 04:23:44 executing program 3: syz_read_part_table(0x700, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 1422.987626] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:44 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x159) 04:23:44 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d}}, 0x40) 04:23:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x7600, 0x6}]}, 0x44}}, 0x0) 04:23:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x6c) 04:23:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sigaltstack(&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000040)) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r2, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000014}, 0x8000) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) 04:23:44 executing program 3: syz_read_part_table(0x900, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:44 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x7700, 0x6}]}, 0x44}}, 0x0) [ 1423.685600] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:44 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e}}, 0x40) 04:23:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x74) 04:23:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6f76657272696465726f61ca7065726d2c00"]) 04:23:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41}}, 0x40) 04:23:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x7800, 0x6}]}, 0x44}}, 0x0) [ 1423.905526] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:45 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x15a) 04:23:45 executing program 3: syz_read_part_table(0xebc, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='overriderockpe\tml\x00']) r2 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r2, 0x113, 0x1, &(0x7f0000000040), 0x0) sendto$inet(r2, &(0x7f0000000040), 0x0, 0xc804, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SG_GET_NUM_WAITING(r4, 0x227d, &(0x7f0000000100)) 04:23:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x7a) 04:23:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}}, 0x40) 04:23:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x7900, 0x6}]}, 0x44}}, 0x0) 04:23:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x7a00, 0x6}]}, 0x44}}, 0x0) [ 1424.592395] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}}, 0x40) 04:23:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xf0) 04:23:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x7b00, 0x6}]}, 0x44}}, 0x0) 04:23:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) sendmsg$NFT_MSG_GETRULE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x124, 0x7, 0xa, 0x301, 0x0, 0x0, {0xc, 0x0, 0x3}, [@NFTA_RULE_COMPAT={0x1c, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_IPV4={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_RULE_COMPAT_FLAGS={0x8}, @NFTA_RULE_COMPAT_PROTO_IPV4={0x8, 0x1, 0x1, 0x0, 0x16}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_COMPAT={0x4c, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x9909}, @NFTA_RULE_COMPAT_FLAGS={0x8}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x883e}, @NFTA_RULE_COMPAT_PROTO_IPV4={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_RULE_COMPAT_FLAGS={0x8}, @NFTA_RULE_COMPAT_PROTO_IPV6={0x8, 0x1, 0x1, 0x0, 0x71}, @NFTA_RULE_COMPAT_FLAGS={0x8}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0xd}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x6004}]}, @NFTA_RULE_USERDATA={0x9a, 0x7, 0x1, 0x0, "fd3b62c4d2011f49546e2d1b19f11953faa9aaddbda1de18aa5dda6b8e9617ec7215a21f331b8c443442353f2889c8e33e79a22b447c96179bc813b498e562792ac2922bdd8ed93b430a5ccc198cb6f5e58055d731d437fcfdf721875d63fb4cd9362b1eb245fc3a3a7efae49e2015ce53f3b8c5b8867ecd13debefec1d57dcdbda59b5fa3b776640ba9d87bdd21dd6ebed0c75a24d7"}]}, 0x124}, 0x1, 0x0, 0x0, 0x4000400}, 0x440c5) 04:23:46 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44}}, 0x40) [ 1424.816001] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:46 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x15b) 04:23:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x7c00, 0x6}]}, 0x44}}, 0x0) 04:23:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x300) 04:23:46 executing program 3: syz_read_part_table(0xff8, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:46 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45}}, 0x40) 04:23:46 executing program 0: r0 = semget$private(0x0, 0x207, 0x0) semop(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x1800}], 0x1) semctl$IPC_RMID(r0, 0x2, 0x10) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000000)=""/17) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000100)=""/234) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) r4 = getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000300)={0xa5, 0x7d, 0x2, {{0x0, 0x90, 0x0, 0x0, {0x0, 0x1, 0x2}, 0x20090000, 0x1, 0x8, 0x80, 0x9, 'ip6_vti0\x00', 0x12, 'securitywlan0self)', 0x21, 'system_u:object_r:hald_exec_t:s0\x00', 0x21, 'system_u:object_r:hald_exec_t:s0\x00'}, 0x0, '', 0x0, r3, r4}}, 0xa5) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@map_acorn='map=acorn'}]}) 04:23:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x7d00, 0x6}]}, 0x44}}, 0x0) 04:23:46 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46}}, 0x40) [ 1425.517440] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x10001, 0xffffff80, 0x80, 0x7, 0x80000001}, 0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) 04:23:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x500) 04:23:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x7e00, 0x6}]}, 0x44}}, 0x0) 04:23:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x7f00, 0x6}]}, 0x44}}, 0x0) [ 1425.728676] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:47 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x15c) 04:23:47 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47}}, 0x40) 04:23:47 executing program 3: syz_read_part_table(0x11b8, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_nanosleep(0x6, 0x0, &(0x7f0000000100)={r2, r3+10000000}, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) 04:23:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x8100, 0x6}]}, 0x44}}, 0x0) 04:23:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x600) 04:23:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x8200, 0x6}]}, 0x44}}, 0x0) 04:23:47 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}}, 0x40) [ 1426.454889] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r2, 0x113, 0x1, &(0x7f0000000040), 0x0) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000100)={{0x2, 0x4e23, @local}, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x50, {0x2, 0x4e22, @loopback}, 'ip6_vti0\x00'}) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) 04:23:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x8300, 0x6}]}, 0x44}}, 0x0) 04:23:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x700) 04:23:47 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a}}, 0x40) [ 1426.685832] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:48 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x15d) 04:23:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x8400, 0x6}]}, 0x44}}, 0x0) 04:23:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) 04:23:48 executing program 3: syz_read_part_table(0x1f00, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xa00) 04:23:48 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b}}, 0x40) 04:23:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xe00) 04:23:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x8500, 0x6}]}, 0x44}}, 0x0) 04:23:48 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}}, 0x40) 04:23:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) membarrier(0x20, 0x0) 04:23:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xf00) 04:23:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x8600, 0x6}]}, 0x44}}, 0x0) 04:23:49 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x15e) 04:23:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='ov\brriderockperm,\x00']) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000100)=""/19) open(&(0x7f0000000040)='./file1\x00', 0x80, 0xa0) 04:23:49 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d}}, 0x40) 04:23:49 executing program 3: syz_read_part_table(0x2000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x1621) 04:23:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x8700, 0x6}]}, 0x44}}, 0x0) 04:23:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x4100a400, &(0x7f0000000040)="d53ab909a73355bce5cb70cc2d", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000240)="0c203d51bf9c03c6f7777d2bdf76a08a1eaa77ebdb6ebd7def3b664d1627219e26aa32d6caddf721e6e713c453653c2a496ffdd3ced8634392b925456f3779dee5d0058eead59e1e9dbe92323c8bf354048259a424896029783d242367a35975db1a3023bfadd74fbd6079c97fd033f2988a0ecebe95c6895446b1b6c0b6df1057d6cd75af7aa0b2c63ba54b9163c038967b9cb81d0c") syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@overriderock='overriderockperm'}]}) recvmmsg(r1, &(0x7f0000000500)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000300)=""/172, 0xac}, {&(0x7f00000003c0)=""/150, 0x96}, {&(0x7f0000000a40)=""/185, 0xb9}, {&(0x7f0000000640)=""/178, 0xb2}, {&(0x7f0000000700)=""/200, 0xc8}, {&(0x7f0000000800)=""/201, 0xc9}, {&(0x7f0000000580)=""/158, 0x9e}], 0x7, &(0x7f0000000480)=""/15, 0x4}, 0x7}], 0x400000000000123, 0x40012002, &(0x7f0000000540)) 04:23:49 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50}}, 0x40) 04:23:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x8800, 0x6}]}, 0x44}}, 0x0) 04:23:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x2000) 04:23:49 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58}}, 0x40) 04:23:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x8900, 0x6}]}, 0x44}}, 0x0) [ 1428.402974] nla_parse: 4 callbacks suppressed [ 1428.402985] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1428.423186] IPVS: ftp: loaded support on port[0] = 21 04:23:50 executing program 3: syz_read_part_table(0x2300, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x2116) 04:23:50 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x15f) 04:23:50 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x8a00, 0x6}]}, 0x44}}, 0x0) 04:23:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b}}, 0x40) [ 1429.150925] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d}}, 0x40) [ 1429.224945] IPVS: ftp: loaded support on port[0] = 21 04:23:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6f7665728b07000000ef09fbeeacf12e1d34006f636b7065726d2c00"]) 04:23:50 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x8b00, 0x6}]}, 0x44}}, 0x0) 04:23:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x4800) 04:23:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}}, 0x40) 04:23:50 executing program 3: syz_read_part_table(0x2a00, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 1429.540049] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:50 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x8c00, 0x6}]}, 0x44}}, 0x0) 04:23:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61}}, 0x40) 04:23:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x4c00) [ 1429.700006] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:51 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x160) 04:23:51 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x40400, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000100)=0x1f, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) getuid() connect$pppl2tp(r2, &(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x1, 0x1, 0x0, 0x1, {0xa, 0x4e24, 0x80000000, @rand_addr="d2a1b9e570eada249a2aebadc194cee6", 0x9}}}, 0x32) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6f7665721dc1ce83e330576d7065726d2c00"]) 04:23:51 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x8d00, 0x6}]}, 0x44}}, 0x0) 04:23:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}}, 0x40) 04:23:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x6000) 04:23:51 executing program 3: syz_read_part_table(0x3f00, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:51 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x8e00, 0x6}]}, 0x44}}, 0x0) 04:23:51 executing program 0: socketpair(0x1, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x40800, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f00000006c0)='i\x85Ol0\x00\x86\xc9K\xbcI\xfe\x87\xd2\x91K\xc2\xa5)\xec\xda\xd9M\x9b]?\xc7]_\x1b\x8e\x14I\x87\x11\xc3VUy4\xde\x8a\xe9\xae@\xd2\xaf\xe3\x02#L*\xad\x8b\xd7\x9a\xd8\xdfi\xafPT\xc1\x15m+H\xd9\x80Hc/^%\xc5Z\xae\x98_\x89B\x927\x91\xb9l\x9f\xfe\xdc\xd7\xdee\x96\x1bfuLP\xe1\xda\xd6\xf1\xe7\xec\x13\x9f\x0ev\x0f\xb5\xeb\xdbwE\xcc\x8a\xe8\fM\xc8Bi \xc5s\xab\x8a\x8f\xf0\xc7\xaf\xf0\xad\xac\n\xce.\xdf\\\x10\xe21B\x11\xbf') r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c00000010023b0e0000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000a000100aaaaaaaaaabb0000200012800e0001006970366772657461700000000c00028008000100", @ANYRES32=r5, @ANYBLOB], 0x4c}}, 0x0) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0xc3}, @local, @local, 0x1f, 0x0, 0x8, 0x0, 0x5, 0x2000009, r5}) 04:23:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64}}, 0x40) [ 1430.130078] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x6800) 04:23:51 executing program 3: syz_read_part_table(0x4000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 1430.353027] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1430.363832] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:23:51 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x8f00, 0x6}]}, 0x44}}, 0x0) [ 1430.476573] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=528 sclass=netlink_route_socket pig=902 comm=syz-executor.0 [ 1430.577397] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1430.649407] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=528 sclass=netlink_route_socket pig=921 comm=syz-executor.0 04:23:52 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x161) 04:23:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x65}}, 0x40) 04:23:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x6c00) 04:23:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x9000, 0x6}]}, 0x44}}, 0x0) 04:23:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f0000000000)={0x4, 0x2}) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f00000000c0)={0x0, 0xc, 0x4, 0x80000000, 0x1a, {0x0, 0x7530}, {0x5, 0x8, 0x2, 0x1f, 0x8, 0x12, "76f9ad0f"}, 0x6, 0x3, @planes=&(0x7f0000000080)={0xfffffffe, 0xff, @mem_offset=0x2, 0x20}, 0x3f, 0x0, r0}) get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0x25, &(0x7f0000ffd000/0x1000)=nil, 0x6) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05140000000000000000000000000900010073797a3017000000002c000000050a05000000000000000000000000000c000240000000000000000014000000110002000000000000000000000000bf4bd2aa0a0000000000000000000000007330c0bb1d63a714fed3049f1e166eeacb53b908bcc4031d4da666ee91830624a73f96b35c17004f207f86de42c3d21c0de95f3e46ac22705013eada13a68ca079e0a2159c30823c29be1893ddb30c2196019a923dec66a378413e8c9caadae70a830817220e32e0d08e603434e43de4374f9248f7d06b0f792baf4582d7d967d26e97d86a409f71264a7c90b4c16704424f38cb02c6"], 0x74}}, 0x0) 04:23:52 executing program 3: syz_read_part_table(0x4552, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x9100, 0x6}]}, 0x44}}, 0x0) [ 1431.014760] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66}}, 0x40) 04:23:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x7400) 04:23:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x154ab, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="50000000100007477402b608dfdbdf250001a381", @ANYRES32=0x0, @ANYBLOB="7fff0002812500001c0012000b0001006d616373656300e10b00020005000d00000300000a0005c00f0000000000000008000a0009d35b4f000000b0b9cad4a128c1aa7cf68a72e13e13201546eb249c276278625c4b7d5652c08b043723262ef1db55855e9b9c3c4f3d85375cfa53566d1becb85f7297cb072cd567309e4df2d41485c9b67530362bc729067a2c1827fb817eec56022b28d49a32965d048e336c6476967ed3c025b32265056d7425271b24a7a00c7f44c83d98fd505c6a5bed69ac554740f4acfe3727902c1863fdd501012315743f6ed430db5f4ba99a97b267f26fbcb9e223ab48d4fb4d4800"/251, @ANYRES32, @ANYBLOB="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"], 0x50}}, 0x0) 04:23:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}}, 0x40) 04:23:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x9200, 0x6}]}, 0x44}}, 0x0) [ 1431.247690] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:53 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x162) 04:23:53 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8054}, 0x4040) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, 0x0, 0x4040) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000100)={0x8d, 0x29, 0x0, {0x0, [{{0x1, 0x0, 0x2}, 0x7fffffff, 0x3, 0xd, './file0/file0'}, {{0x0, 0x2, 0x8}, 0x101, 0x64, 0x7, './file0'}, {{0x40, 0x2}, 0x4631, 0x8, 0x7, './file0'}, {{0x8, 0x3, 0x5}, 0x3, 0x7, 0x7, './file0'}]}}, 0x8d) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$selinux_create(r2, &(0x7f0000000000)=ANY=[], 0x0) syz_open_dev$mice(0x0, 0x0, 0x8400) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 04:23:53 executing program 3: syz_read_part_table(0x4800, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x7a00) 04:23:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}}, 0x40) 04:23:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x9300, 0x6}]}, 0x44}}, 0x0) 04:23:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xf000) [ 1431.919113] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x9400, 0x6}]}, 0x44}}, 0x0) 04:23:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}}, 0x40) [ 1432.090126] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x9500, 0x6}]}, 0x44}}, 0x0) 04:23:53 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000033000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x48}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000002f000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:23:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d}}, 0x40) 04:23:54 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x163) 04:23:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x34000) 04:23:54 executing program 3: syz_read_part_table(0x4c00, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x9600, 0x6}]}, 0x44}}, 0x0) 04:23:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e}}, 0x40) 04:23:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r6, r2, &(0x7f0000001000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, &(0x7f0000000100)="66b9800000c00f326635010000000f3020db0feef1f001684866b80500000066b92c32274e0f01d9ead5009f002626f30f09b8c2000f00d8f0809f000085360f380b39", 0x43}], 0x1, 0x20, &(0x7f0000000080)=[@cstype0={0x4, 0xa}, @cstype0={0x4, 0x2}], 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:23:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x9700, 0x6}]}, 0x44}}, 0x0) 04:23:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x400300) 04:23:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71}}, 0x40) 04:23:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x9800, 0x6}]}, 0x44}}, 0x0) 04:23:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x72}}, 0x40) 04:23:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r3 = socket(0x80000000000000a, 0x2, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000000)={r5}, 0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={r5, 0x3, 0x20, 0xcb61}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7ff, 0x2) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x7fffffff, &(0x7f0000000100)=0x0) io_submit(r7, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x1, 0x0, r6, &(0x7f0000000000)="98", 0x3e80000000}]) 04:23:54 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x164) 04:23:54 executing program 3: syz_read_part_table(0x5245, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xf0ff7f) 04:23:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x9900, 0x6}]}, 0x44}}, 0x0) 04:23:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73}}, 0x40) 04:23:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="8000c018001e000b060000000300"/25], 0x14}}, 0x0) [ 1433.832015] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7680 sclass=netlink_route_socket pig=1079 comm=syz-executor.0 04:23:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x9a00, 0x6}]}, 0x44}}, 0x0) 04:23:55 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x75}}, 0x40) 04:23:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xf0ffff) 04:23:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text16={0x10, &(0x7f0000000100)="f30f236e0fae0d0f229166660f1c03f3f3d9e8f2d9e5b813018ed00f01c966660f58a90000f2f08199bf2e0010", 0x2d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(r3) r5 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r5, 0x113, 0x1, &(0x7f0000000040), 0x0) ioctl$SIOCAX25GETINFOOLD(r5, 0x89e9, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0xb7, 0x6, @random="c1dbc0d40f4e"}, 0x14) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:23:55 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b}}, 0x40) 04:23:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x9b00, 0x6}]}, 0x44}}, 0x0) 04:23:55 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x165) 04:23:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x1000000) 04:23:55 executing program 3: syz_read_part_table(0x5500, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:55 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0}}, 0x40) 04:23:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x9c00, 0x6}]}, 0x44}}, 0x0) 04:23:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="580000000206010200000000000000000000000005000400000000000900020073797a30000000000c00078008000640000000000500050002000000050001000600000014000300257b73683a69702c706f72742c697000"], 0x58}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 04:23:55 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}}, 0x40) [ 1434.768588] Can't find ip_set type %{sh:ip,port,ip [ 1434.774275] nla_parse: 2 callbacks suppressed [ 1434.774285] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x9d00, 0x6}]}, 0x44}}, 0x0) 04:23:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="580000000206010200000000000000000000000005000400000000000900020073797a30000000000c00078008000640000000000500050002000000050001000600000014000300257b73683a69702c706f72742c697000"], 0x58}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 04:23:56 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2}}, 0x40) 04:23:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x2000000) 04:23:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x9e00, 0x6}]}, 0x44}}, 0x0) [ 1434.999739] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:56 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x166) 04:23:56 executing program 3: syz_read_part_table(0x6800, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:56 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x7}}, 0x40) 04:23:56 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ttyS3\x00', 0x0, 0x0) getpid() sched_setscheduler(0x0, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$TIOCSETD(r0, 0x541e, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x10001, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r2, 0xc04064aa, &(0x7f0000000140)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[{}, {}, {}, {}], 0x800, 0x0, [], 0x4, 0x4}) 04:23:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x3000000) 04:23:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x9f00, 0x6}]}, 0x44}}, 0x0) 04:23:56 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x8}}, 0x40) [ 1435.690724] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xa000, 0x6}]}, 0x44}}, 0x0) 04:23:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x4000000) 04:23:57 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ttyS3\x00', 0x0, 0x0) getpid() sched_setscheduler(0x0, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$TIOCSETD(r0, 0x541e, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x10001, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r2, 0xc04064aa, &(0x7f0000000140)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[{}, {}, {}, {}], 0x800, 0x0, [], 0x4, 0x4}) 04:23:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xa100, 0x6}]}, 0x44}}, 0x0) 04:23:57 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x9}}, 0x40) [ 1435.871615] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:57 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x167) 04:23:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x5000000) 04:23:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xa200, 0x6}]}, 0x44}}, 0x0) 04:23:57 executing program 3: syz_read_part_table(0x6c00, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:57 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xa}}, 0x40) 04:23:57 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ttyS3\x00', 0x0, 0x0) getpid() sched_setscheduler(0x0, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$TIOCSETD(r0, 0x541e, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x10001, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r2, 0xc04064aa, &(0x7f0000000140)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[{}, {}, {}, {}], 0x800, 0x0, [], 0x4, 0x4}) 04:23:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xa300, 0x6}]}, 0x44}}, 0x0) 04:23:57 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xc}}, 0x40) [ 1436.599404] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x6000000) 04:23:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) io_setup(0x3, &(0x7f0000000000)) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x0, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000000)={{}, 0x8}) open(&(0x7f0000021000)='./file0\x00', 0x440000, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) shutdown(r0, 0x1) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) pipe(0x0) unshare(0x40000000) 04:23:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xa400, 0x6}]}, 0x44}}, 0x0) [ 1436.766943] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x7000000) [ 1436.904039] IPVS: ftp: loaded support on port[0] = 21 [ 1436.906832] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:58 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x168) 04:23:58 executing program 3: syz_read_part_table(0x7400, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xa500, 0x6}]}, 0x44}}, 0x0) 04:23:58 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xd}}, 0x40) 04:23:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x8000000) 04:23:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) io_setup(0x3, &(0x7f0000000000)) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x0, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000000)={{}, 0x8}) open(&(0x7f0000021000)='./file0\x00', 0x440000, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) shutdown(r0, 0x1) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) pipe(0x0) unshare(0x40000000) 04:23:58 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xe}}, 0x40) [ 1437.558515] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xa600, 0x6}]}, 0x44}}, 0x0) 04:23:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xa000000) [ 1437.627529] IPVS: ftp: loaded support on port[0] = 21 04:23:58 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xf}}, 0x40) 04:23:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xa700, 0x6}]}, 0x44}}, 0x0) [ 1437.727974] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1437.801471] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:23:59 executing program 3: syz_read_part_table(0x7a00, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:59 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x169) 04:23:59 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x18}}, 0x40) 04:23:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xa800, 0x6}]}, 0x44}}, 0x0) 04:23:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xe000000) 04:23:59 executing program 3: syz_read_part_table(0xb811, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:23:59 executing program 0: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000080)='ramfs\x00', 0x50, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1, 0x0, 0x0, 0x9}) unshare(0x40600) r4 = gettid() write$9p(r3, &(0x7f0000000180)="16", 0x1) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) write$FUSE_IOCTL(r3, &(0x7f00000001c0)={0x16}, 0x20) r5 = open(&(0x7f0000000100)='./file0/bus\x00', 0x14000, 0x69) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r5, 0xc02c5341, &(0x7f0000000340)) tkill(r4, 0x1000000000016) 04:23:59 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1a}}, 0x40) 04:23:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xa900, 0x6}]}, 0x44}}, 0x0) 04:23:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xf000000) 04:23:59 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1b}}, 0x40) 04:23:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xaa00, 0x6}]}, 0x44}}, 0x0) 04:23:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1802, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x1ff) socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) dup2(r2, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000900)=ANY=[@ANYBLOB="c756705c4e9d68821f1f11438ace1a11a3a773a6bb052d475cc8e31fbbf41d595dc0ce5800069cbfbc058a5d5e467a83e51972bb59354828e7952a6689e7c67a5bd1dc5b5d2597cd670ec318184eafefb972bdd9eb3004f49b7e79aca0b527a333a0d0a79e8e16cec4465298b5bac9e4e4b535383946fd41db6e08dd3c945a515f13aa0151b671e98e4cc44a832b05184351d9e48378525569a75fe94a105e1a07b3ae699a321eeee056f9cb72d36186750ec0b73bb79e", @ANYRES16=r4, @ANYBLOB="dd0700000000000000ffffff7f003fb95a565200abbdc265d1db3d039f9499bb5a6bbb9441362d1b42bcf3e8d1ba25ba9d6cf027e2eac8488ae8cafdc37a18d1cd65f76808033d7249a744e9c28a051e61bff5baa01f00d3785e485bcfc413075ef3648ba5c38e619c141afb135b63ae07000000000000001fefd3583560617b22ad75fbda7e598866b71fc63d0a"], 0x3}}, 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="b2010000987b66656ed37bc517304bbd85f2e6b1554ee89596e2112919c8581871c64fed0cd75eff2804022ec1d218eaef63d2ea82609861879c021869c064ec3d8399e2a91927618d3fc96c69fad609f11cf8d3648de2b50ba4a3ae041591fdd2133bf84fab26b8", @ANYRES16=0x0, @ANYBLOB="0000000000000000000001000000080001007063690011000200303030303a30303a31302e30000000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080001007063690011000200303030303a30303a31302e30000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f0002006e657464657673696d300000"], 0xac}, 0x1, 0x0, 0x0, 0x24000000}, 0x4000) openat$sequencer(0xffffffffffffff9c, 0x0, 0x313d42, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000200)={0x2, 0x4e20, @rand_addr=0x56c}, 0x10) syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') connect$inet(r5, &(0x7f0000000000)={0x2, 0x4e20, @rand_addr=0x1ff}, 0x10) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) r7 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r8 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Z\x04\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86/\x9f\x8f\xc0)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r8, &(0x7f0000000200)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r8) write$binfmt_script(r7, &(0x7f00000004c0)=ANY=[@ANYRES32], 0x4) sendfile(r7, r8, 0x0, 0x20000102000007) r9 = openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x100, 0xee) dup2(r9, r1) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x2, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r10, 0x8982, 0x0) r11 = syz_open_dev$ttys(0xc, 0x2, 0x1) close(r11) open(0x0, 0x541042, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x6) r12 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r12, 0xc02064b2, &(0x7f0000000080)={0xfffffff7, 0x3, 0x172, 0x4d, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(0xffffffffffffffff, 0xc01064b3, &(0x7f0000000180)={r13}) 04:24:00 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x16a) 04:24:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x20000000) 04:24:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3e}}, 0x40) 04:24:00 executing program 3: syz_read_part_table(0xbc0e, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xab00, 0x6}]}, 0x44}}, 0x0) 04:24:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1802, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x1ff) socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) dup2(r2, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000900)=ANY=[@ANYBLOB="c756705c4e9d68821f1f11438ace1a11a3a773a6bb052d475cc8e31fbbf41d595dc0ce5800069cbfbc058a5d5e467a83e51972bb59354828e7952a6689e7c67a5bd1dc5b5d2597cd670ec318184eafefb972bdd9eb3004f49b7e79aca0b527a333a0d0a79e8e16cec4465298b5bac9e4e4b535383946fd41db6e08dd3c945a515f13aa0151b671e98e4cc44a832b05184351d9e48378525569a75fe94a105e1a07b3ae699a321eeee056f9cb72d36186750ec0b73bb79e", @ANYRES16=r4, @ANYBLOB="dd0700000000000000ffffff7f003fb95a565200abbdc265d1db3d039f9499bb5a6bbb9441362d1b42bcf3e8d1ba25ba9d6cf027e2eac8488ae8cafdc37a18d1cd65f76808033d7249a744e9c28a051e61bff5baa01f00d3785e485bcfc413075ef3648ba5c38e619c141afb135b63ae07000000000000001fefd3583560617b22ad75fbda7e598866b71fc63d0a"], 0x3}}, 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="b2010000987b66656ed37bc517304bbd85f2e6b1554ee89596e2112919c8581871c64fed0cd75eff2804022ec1d218eaef63d2ea82609861879c021869c064ec3d8399e2a91927618d3fc96c69fad609f11cf8d3648de2b50ba4a3ae041591fdd2133bf84fab26b8", @ANYRES16=0x0, @ANYBLOB="0000000000000000000001000000080001007063690011000200303030303a30303a31302e30000000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080001007063690011000200303030303a30303a31302e30000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000e0001006e657464657673696d0000000f0002006e657464657673696d300000"], 0xac}, 0x1, 0x0, 0x0, 0x24000000}, 0x4000) openat$sequencer(0xffffffffffffff9c, 0x0, 0x313d42, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000200)={0x2, 0x4e20, @rand_addr=0x56c}, 0x10) syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') connect$inet(r5, &(0x7f0000000000)={0x2, 0x4e20, @rand_addr=0x1ff}, 0x10) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) r7 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r8 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Z\x04\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86/\x9f\x8f\xc0)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r8, &(0x7f0000000200)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r8) write$binfmt_script(r7, &(0x7f00000004c0)=ANY=[@ANYRES32], 0x4) sendfile(r7, r8, 0x0, 0x20000102000007) r9 = openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x100, 0xee) dup2(r9, r1) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x2, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r10, 0x8982, 0x0) r11 = syz_open_dev$ttys(0xc, 0x2, 0x1) close(r11) open(0x0, 0x541042, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x6) r12 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r12, 0xc02064b2, &(0x7f0000000080)={0xfffffff7, 0x3, 0x172, 0x4d, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(0xffffffffffffffff, 0xc01064b3, &(0x7f0000000180)={r13}) 04:24:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x4f}}, 0x40) 04:24:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x21160000) 04:24:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xac00, 0x6}]}, 0x44}}, 0x0) 04:24:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x9b}}, 0x40) 04:24:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xad00, 0x6}]}, 0x44}}, 0x0) 04:24:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x48000000) [ 1439.796257] nla_parse: 4 callbacks suppressed [ 1439.796266] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1439.843607] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:01 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x16b) 04:24:01 executing program 3: syz_read_part_table(0xf80f, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:01 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f0000000280)={0xc3, 0x8, 0x4, 0x80000, 0x5, {}, {0x1, 0x0, 0x7, 0x0, 0x8, 0x0, "03108fe3"}, 0x2, 0x3, @userptr=0x7, 0x6, 0x0, r0}) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000000380)={0x8, 0x120, 0xfa00, {0x3, {0x81, 0x20, "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", 0x40, 0x6, 0x7f, 0x8, 0xf7, 0x5, 0x0, 0x1}, r8}}, 0x128) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x6) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@xino_off='xino=off'}]}) 04:24:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xae00, 0x6}]}, 0x44}}, 0x0) 04:24:01 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xf0}}, 0x40) 04:24:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x4c000000) 04:24:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xaf00, 0x6}]}, 0x44}}, 0x0) 04:24:01 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x180}}, 0x40) [ 1440.371693] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x60000000) 04:24:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xb000, 0x6}]}, 0x44}}, 0x0) 04:24:01 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x700}}, 0x40) 04:24:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x2b, 0x4, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)={0xe8, 0x7}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c00010062726964676500000300020092ab29e6bc90313f5c14a818e765b4fd2a0e0ffabd5f884b8215627962f7a4aab6691329692afb3fdcc3e7378871f430fe0e63a139f8432b7c88d952fec2b4b0543063914575e89dce08917ef4c83982304f91f231dc1ecf62c4bf0541ff2b5060b6a4d69b9403c96422fd8632e43e946636599dedd725bcd83c8971198e43e29e4b1c15388e01dee5bf7c4e128ff5b5c146c15db0684e76186c1d4209d8b4158f7b359d8efa69231277e09c47884e9fb0b010687409fc6fa73c91c9504b4460a91a865e0897f10dc1c1e0edc0d560f18478d67cc5cf8dbb0ee5003f6cc7185e99bc93bcb9eb76abba12076a8d076c853092edf73f4224c4e770006630b3a7e43c7e4c90ce6a20fac946584d406aa1cc75103f746d1f026456e44c9a39c62eecdb8bb82ca275e24c5c9095cbc8a6701a2447f9f6e6e4a372717366f176f0e4df46e9e28ede8a00e2a8b3dc"], 0x34}}, 0x0) r5 = socket(0x10, 0x803, 0x0) socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r6}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) r7 = socket(0x10, 0x803, 0x0) r8 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r8, 0x113, 0x1, &(0x7f0000000040), 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r8, 0x84, 0x1c, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="340000001400b59500000a18e30cf50000000000", @ANYRES32=r10, @ANYBLOB="08fffa500000b9000077f1000005fff7000000"], 0x34}}, 0x0) [ 1440.610844] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1440.683311] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1440.756117] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 04:24:02 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x16c) 04:24:02 executing program 3: syz_read_part_table(0xff0f, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xb100, 0x6}]}, 0x44}}, 0x0) 04:24:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x68000000) 04:24:02 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x900}}, 0x40) 04:24:02 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(r2, 0xc01864ba, &(0x7f0000000000)={0x0, 0x14, 0x1d}) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r2, 0xc0086421, &(0x7f0000000040)={r3, 0x2}) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000000000)={r3}) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TIOCSIG(r1, 0x40045436, 0x2e) fcntl$setstatus(r4, 0x4, 0x46802) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000080)={0x20, 0xffffffffffffffda, 0x6, {0x0, 0x1}}, 0x20) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) set_tid_address(0x0) io_setup(0xc32f, &(0x7f0000001140)=0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00001ed000/0x4000)=nil, 0x4000, 0x1000001, 0x4012, r6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r5, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r4, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 04:24:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xb200, 0x6}]}, 0x44}}, 0x0) [ 1441.281713] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1be, 0x0) listen(r0, 0x1d7) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f00000001c0)={0x8, 0xffffffff, 0x0, 'queue1\x00', 0x8}) r3 = socket$inet_sctp(0x2, 0x801, 0x84) r4 = epoll_create1(0x80000) ioctl(r4, 0x5, &(0x7f00000000c0)="f484740daae3aa65db13d8f14a57491a2f6ae4c5143d63765c233d21f3e83e56a182af0477dd99848844e1cff215b1fd8d656461cd1f09b5ddfdc28911e67bdefebcbc4a9b233881b641513e5f224fce184bf0c40ad9b7f1063ca907ef46de18eea925eb572b2361cf15221de3c0453faef559ec6b9a016fad93b001b21367ff7c8df326afff3c566575c30c08555c0d16897c0eaef978c18863099b0e1f") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x1006c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r3, &(0x7f0000000180)={&(0x7f00000009c0)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000a40)="b2", 0x1}], 0x1, 0x0, 0x0, 0x9000004}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r5, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) r6 = dup3(0xffffffffffffffff, r5, 0x80000) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af22, &(0x7f0000000300)={0x1, r6}) 04:24:02 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xa00}}, 0x40) 04:24:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x6c000000) 04:24:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xb300, 0x6}]}, 0x44}}, 0x0) 04:24:02 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xc00}}, 0x40) [ 1441.494985] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:03 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x16d) 04:24:03 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xd00}}, 0x40) 04:24:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xb400, 0x6}]}, 0x44}}, 0x0) 04:24:03 executing program 3: syz_read_part_table(0x20000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x74000000) 04:24:03 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xe00}}, 0x40) 04:24:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xb500, 0x6}]}, 0x44}}, 0x0) [ 1442.474094] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:03 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000000)={0x4, 0x2}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r3, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VT_GETMODE(r7, 0x5601, &(0x7f0000000300)) ioctl$USBDEVFS_CONTROL(r5, 0xc0185500, &(0x7f00000002c0)={0x1f, 0x15, 0x6, 0x0, 0x7f, 0xffffffff, &(0x7f0000000240)="119800fb6cc9c550202c8f1eef334db5b6248dcc0ac61f778333536bbdebe46f1807edd2c25d707a11bbd67f99a5632c40eb27666edd24e76e3b8f2143d11434c85b0901aa0122bbd2875b74d92562ed0bb41aaad110d3051ab1890668a0583338110ddb07fc1530d9fd4cd71747ab24af16a4a91949c760fa73df26520198"}) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f00000001c0)={0x10000, 0x2, 0x4, 0x20, 0x9, {r1, r2/1000+10000}, {0x2, 0x1, 0x1, 0x81, 0x1f, 0x7f, "e7d2f015"}, 0xfff, 0x2, @fd, 0x10000, 0x0, r3}) ioctl$USBDEVFS_CLEAR_HALT(r8, 0x80045515, &(0x7f0000000140)={0xb}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0xc102, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000000c0)) 04:24:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x7a000000) 04:24:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xb600, 0x6}]}, 0x44}}, 0x0) 04:24:03 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xf00}}, 0x40) 04:24:03 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x81}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000000340)={0x0, 0x1}) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'dummy0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r6, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) fcntl$addseals(r6, 0x409, 0x8) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYRES64=r2, @ANYPTR64, @ANYBLOB="00000000000000001c0012000b00010062726964676500000c000200050007000500000011d9165fe35cf75e5adcafc537684466a96e0a317fc47ff9ed949d8a82743f4012689ebb70da8c5a"], 0x3}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="2800000010000104000000000000000000002a018dc75213db0f7a3980fa8b2affa739353ee5a4f2d1bea34a2b96b14f2a9987ca282778fef10ff50da5a9ee97505395f2c7da0d2368e4c7a2f05e344575", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\'\x00\n\x00', @ANYRES32=r7, @ANYBLOB], 0x28}}, 0x0) [ 1442.729288] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:04 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x16e) 04:24:04 executing program 3: syz_read_part_table(0x32957, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xb700, 0x6}]}, 0x44}}, 0x0) 04:24:04 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1800}}, 0x40) 04:24:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x7fffef90) 04:24:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x20011, r5, 0x0) r6 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) r7 = socket(0x80000000000000a, 0x2, 0x0) close(r7) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000000)={r9}, 0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={r9, 0x1}, 0x8) 04:24:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xb800, 0x6}]}, 0x44}}, 0x0) 04:24:04 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1a00}}, 0x40) 04:24:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x7ffff000) 04:24:04 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1b00}}, 0x40) 04:24:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xb900, 0x6}]}, 0x44}}, 0x0) 04:24:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x90efff7f) 04:24:05 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x16f) 04:24:05 executing program 3: syz_read_part_table(0x100000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:05 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3e00}}, 0x40) 04:24:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xba00, 0x6}]}, 0x44}}, 0x0) 04:24:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x97ffffff) 04:24:05 executing program 0: syz_mount_image$xfs(&(0x7f00000001c0)='xfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@dax='dax'}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) 04:24:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xbb00, 0x6}]}, 0x44}}, 0x0) 04:24:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x9effffff) 04:24:05 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x4f00}}, 0x40) 04:24:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_PRIMARY={0x8, 0x10}]}}}]}, 0x3c}}, 0x0) 04:24:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xbc00, 0x6}]}, 0x44}}, 0x0) 04:24:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xf0ffffff) [ 1444.430223] netlink: 'syz-executor.0': attribute type 16 has an invalid length. 04:24:06 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x170) 04:24:06 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x7f00}}, 0x40) 04:24:06 executing program 3: syz_read_part_table(0x400000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:06 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xbd00, 0x6}]}, 0x44}}, 0x0) 04:24:06 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VFIO_IOMMU_MAP_DMA(r0, 0x3b71, &(0x7f0000000000)={0x20, 0x3, 0x1, 0x10000, 0x5}) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x14, 0x84, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) 04:24:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xf5ffffff) 04:24:06 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xbe00, 0x6}]}, 0x44}}, 0x0) 04:24:06 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0xfd, 0x0, 0x0, 0x0, 0x0, 0x20}, [@IFLA_OPERSTATE={0x5, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0xffffffc3}, 0x0) 04:24:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xfcffffff) 04:24:06 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x9b00}}, 0x40) 04:24:06 executing program 3: syz_read_part_table(0x6b6b6b, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:06 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xbf00, 0x6}]}, 0x44}}, 0x0) [ 1445.405077] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1445.449742] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 04:24:07 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x171) 04:24:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xfffff000) 04:24:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xf000}}, 0x40) 04:24:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r2, 0x113, 0x1, &(0x7f0000000040), 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r3, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r4, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) recvmsg(r4, &(0x7f00000004c0)={&(0x7f0000000240)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f00000002c0)=""/96, 0x60}, {&(0x7f0000000340)=""/128, 0x80}, {&(0x7f00000003c0)=""/76, 0x4c}], 0x3, &(0x7f0000000440)=""/79, 0x4f}, 0x40000022) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000180)={r3, 0x7dd4, 0x200, "0eb47569d3e41c5636b43784bd782bc446f5c9ae92fb17cbf8691debb30fd8c62f8d8e094b7b399b83097f8472ed9245388b88e26cfed96959241c958a85544371a28a6c361ba31ed2be298ab4e75323b18d08eeacaaa95235cc89c65b95f12619c6b2c854ae63da6f909b8357fac7bd7749a991e7bd777dec47d1ddc46eece2ed97acbf536257e03a22b9ac60433b6edf10b43c95de79be66"}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r1}}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x6}]}, 0x40}}, 0x0) 04:24:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xc000, 0x6}]}, 0x44}}, 0x0) 04:24:07 executing program 3: syz_read_part_table(0x1000000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xf00000}}, 0x40) 04:24:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xffffff7f) 04:24:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xc100, 0x6}]}, 0x44}}, 0x0) 04:24:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1000000}}, 0x40) 04:24:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xc200, 0x6}]}, 0x44}}, 0x0) 04:24:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xffffff97) 04:24:08 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x172) 04:24:08 executing program 3: syz_read_part_table(0x2000000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:08 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1800000}}, 0x40) 04:24:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xc300, 0x6}]}, 0x44}}, 0x0) 04:24:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xffffff9e) 04:24:08 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) io_setup(0xff, &(0x7f0000000200)=0x0) io_submit(r2, 0x1, &(0x7f0000001700)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000000)="88", 0x1}]) io_destroy(r2) tkill(r0, 0x1000000000016) 04:24:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xfffffff0) 04:24:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xc400, 0x6}]}, 0x44}}, 0x0) 04:24:08 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2000000}}, 0x40) 04:24:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x400000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="2400000022002551071c0165ff00fc020200000000100f000ee1000c08000b0003000f00", 0x24) syz_genetlink_get_family_id$nl80211(0x0) write$binfmt_misc(r0, &(0x7f0000000180)={'syz1', "66e5f7a2b73533c7382069ad55c5fb2d895e8ec14b0074e1a08acbf507df3adb9a8d9223e168bcb13f8d8210fb5a1d5003a6dce91bb751b76053d6422b51b0bab6dc1cf593238125b44d5190640f47f5ee6a"}, 0x56) sendmsg$NL80211_CMD_DEL_MPATH(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x400, 0x0) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000080)="c8476da835aa0a86105f1a486cb6c6f9d046ac65279995166ad0bf05e59bf933e7a934b1dd08ba8729d526aa2180e953d506bb01ab3306ab0873b60349263c49ce33a8153f1daec834b265b37480b5bee452d91746d991dd51f76b20009569567c92e37bfe0fed08d4cc8356522fe378ff287edfabd0fe3305e424991e11f78ae27f6d0f7ba3f5584d328c326b4921e420c8f0dae3b020c92a5fdde4543dc4d66ba674a3224ce597724c81dc631bf9e6a3b8794fb069457d04284c2837d4cc31ab7c") openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:24:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xc500, 0x6}]}, 0x44}}, 0x0) 04:24:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xfffffff5) [ 1447.367773] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=58726 sclass=netlink_route_socket pig=1813 comm=syz-executor.0 04:24:09 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x173) 04:24:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x7000000}}, 0x40) 04:24:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xc600, 0x6}]}, 0x44}}, 0x0) 04:24:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xfffffffc) 04:24:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x400000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="2400000022002551071c0165ff00fc020200000000100f000ee1000c08000b0003000f00", 0x24) syz_genetlink_get_family_id$nl80211(0x0) write$binfmt_misc(r0, &(0x7f0000000180)={'syz1', "66e5f7a2b73533c7382069ad55c5fb2d895e8ec14b0074e1a08acbf507df3adb9a8d9223e168bcb13f8d8210fb5a1d5003a6dce91bb751b76053d6422b51b0bab6dc1cf593238125b44d5190640f47f5ee6a"}, 0x56) sendmsg$NL80211_CMD_DEL_MPATH(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x400, 0x0) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000080)="c8476da835aa0a86105f1a486cb6c6f9d046ac65279995166ad0bf05e59bf933e7a934b1dd08ba8729d526aa2180e953d506bb01ab3306ab0873b60349263c49ce33a8153f1daec834b265b37480b5bee452d91746d991dd51f76b20009569567c92e37bfe0fed08d4cc8356522fe378ff287edfabd0fe3305e424991e11f78ae27f6d0f7ba3f5584d328c326b4921e420c8f0dae3b020c92a5fdde4543dc4d66ba674a3224ce597724c81dc631bf9e6a3b8794fb069457d04284c2837d4cc31ab7c") openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:24:09 executing program 3: syz_read_part_table(0x3000000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xc700, 0x6}]}, 0x44}}, 0x0) 04:24:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x7ffffffff000) 04:24:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x8000000}}, 0x40) [ 1448.028844] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=58726 sclass=netlink_route_socket pig=1844 comm=syz-executor.0 04:24:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xc800, 0x6}]}, 0x44}}, 0x0) 04:24:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x40030000000000) 04:24:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x9000000}}, 0x40) [ 1448.249722] nla_parse: 4 callbacks suppressed [ 1448.249732] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:09 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x174) 04:24:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x400, 0x0, 0x5}, &(0x7f0000000080)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="131c000100180001000b0001006d697272656400000400020000000000000100"/48], 0x30}}, 0x0) 04:24:09 executing program 3: syz_read_part_table(0x4000000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xc900, 0x6}]}, 0x44}}, 0x0) 04:24:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xa000000}}, 0x40) 04:24:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xf0ff7f00000000) 04:24:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xca00, 0x6}]}, 0x44}}, 0x0) 04:24:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xc000000}}, 0x40) [ 1448.807121] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1448.838280] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6144 sclass=netlink_route_socket pig=1878 comm=syz-executor.0 04:24:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xf0ffffff7f0000) 04:24:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xcb00, 0x6}]}, 0x44}}, 0x0) 04:24:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xd000000}}, 0x40) 04:24:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e23, 0x80000000, @rand_addr="1eda18494643a573555d78879c30ac2b", 0xd2}}, 0x0, 0x0, 0x1c, 0x0, "0054413925f309af865c43468f20784798373715ccfd914dbe04eba4da291086529dbb313ffb2b4894dbfbb8dbc12767fda28f0ba891ce0cb36152113f83dce821472f07c02ff41fe6a56a3c9d952585"}, 0xd8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17, 0xfffffffffffffffc}], 0x0, &(0x7f0000000080)=ANY=[@ANYRES16=r0]) r3 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f00000001c0)='cpuacct.usage_user\x00', 0x0, 0x0) r4 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xa67, 0x8180) r5 = socket(0x80000000000000a, 0x2, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000600)=ANY=[], &(0x7f000095dffc)) r7 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$USBDEVFS_DISCSIGNAL(r7, 0x8010550e, &(0x7f0000000180)={0x6, &(0x7f0000000300)="7a3381ab1909729f6692e31569a70a31a3b8699d3fc682c2cf674e3eadcd73ee1c391d5d897e520c746a9ba9b80fa0a4723345ef7624aabe6150728fc606a85a066884eafb116d4526a444d1aee2b80dbbf1d81d7de16d9860a4be503df97a581ac8fbb750e897b1fe08"}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000000), 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000100), 0x8) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 04:24:10 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x175) 04:24:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xf0ffffffffffff) 04:24:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xcc00, 0x6}]}, 0x44}}, 0x0) 04:24:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xe000000}}, 0x40) 04:24:10 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x48000, 0x0) fcntl$dupfd(r1, 0x406, r2) listen(r0, 0x5eb05a) r3 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r3, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r4 = accept4(r0, 0x0, 0x0, 0x0) r5 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r5, 0xc0405665, &(0x7f0000000000)={0x4, 0x2}) ioctl$VIDIOC_S_PRIORITY(r5, 0x40045644, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000003680)=[{{0x0, 0x0, &(0x7f00000018c0)=[{0x0}, {0x0}, {&(0x7f00000006c0)=""/211, 0xd3}], 0x3}}], 0x1, 0x0, 0x0) sendmmsg(r4, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 04:24:10 executing program 3: syz_read_part_table(0x5000000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xf000000}}, 0x40) 04:24:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xcd00, 0x6}]}, 0x44}}, 0x0) 04:24:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x100000000000000) 04:24:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x18000000}}, 0x40) 04:24:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xce00, 0x6}]}, 0x44}}, 0x0) [ 1449.994074] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:11 executing program 3: syz_read_part_table(0x6000000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:11 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x176) 04:24:11 executing program 0: sendmsg$IPCTNL_MSG_CT_GET_DYING(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) migrate_pages(0x0, 0x0, 0x0, &(0x7f0000000040)) syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(r0, 0x3b71, 0x0) getsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000380), &(0x7f00000003c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @pix={0x600, 0x1f}}, 0x0, [0x5000000]}) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f00000000c0)={0x14, r4, 0x31f}, 0x14}}, 0x0) sendmsg$NL80211_CMD_GET_STATION(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0x50, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@NL80211_ATTR_MESH_PEER_AID={0x6, 0xed, 0x2b0}, @NL80211_ATTR_STA_WME={0x34, 0x81, [@NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x9}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0xbf}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x60}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x4}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x8}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x1f}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x4048015}, 0x0) 04:24:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x200000000000000) 04:24:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1a000000}}, 0x40) 04:24:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xcf00, 0x6}]}, 0x44}}, 0x0) 04:24:11 executing program 3: syz_read_part_table(0x7000000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xd000, 0x6}]}, 0x44}}, 0x0) [ 1450.778445] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:12 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1b000000}}, 0x40) 04:24:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x300000000000000) 04:24:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xd100, 0x6}]}, 0x44}}, 0x0) [ 1450.928280] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:12 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3e000000}}, 0x40) 04:24:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x400000000000000) [ 1451.135169] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:12 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x177) 04:24:12 executing program 0: sendmsg$IPCTNL_MSG_CT_GET_DYING(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) migrate_pages(0x0, 0x0, 0x0, &(0x7f0000000040)) syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x0, 0x0) mkdir(0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(r0, 0x3b71, 0x0) getsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000380), &(0x7f00000003c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @pix={0x600, 0x1f}}, 0x0, [0x5000000]}) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f00000000c0)={0x14, r4, 0x31f}, 0x14}}, 0x0) sendmsg$NL80211_CMD_GET_STATION(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0x50, r4, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@NL80211_ATTR_MESH_PEER_AID={0x6, 0xed, 0x2b0}, @NL80211_ATTR_STA_WME={0x34, 0x81, [@NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x9}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0xbf}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x60}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x4}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x8}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x1f}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x4048015}, 0x0) 04:24:12 executing program 3: syz_read_part_table(0x9000000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xd200, 0x6}]}, 0x44}}, 0x0) 04:24:12 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x4f000000}}, 0x40) 04:24:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x500000000000000) [ 1451.702200] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xd300, 0x6}]}, 0x44}}, 0x0) 04:24:12 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x7f000000}}, 0x40) 04:24:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x600000000000000) 04:24:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xd400, 0x6}]}, 0x44}}, 0x0) 04:24:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x80ffffff}}, 0x40) 04:24:13 executing program 0: fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in=@rand_addr=0x610000, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x32}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x2, 0xff, 0x7ff}}, 0xe8) r1 = socket$inet6(0xa, 0x80801, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x3d, 0x0, &(0x7f00000004c0)) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0xffffffffffffffff, 0xfff, @ipv4={[], [], @remote}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) [ 1451.957091] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:13 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x178) 04:24:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xd500, 0x6}]}, 0x44}}, 0x0) 04:24:13 executing program 3: syz_read_part_table(0xbe5a941, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x9b000000}}, 0x40) 04:24:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x700000000000000) 04:24:13 executing program 0: write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x60d18ea6889c169d}}, 0x50) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000500)=ANY=[@ANYBLOB="56b2ff"], 0x1}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="8000000038040000197a0300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4803, 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r4, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, r1, &(0x7f0000000040)={r3, r4, 0x5}) [ 1452.631244] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xd600, 0x6}]}, 0x44}}, 0x0) 04:24:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x800000000000000) 04:24:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xffffff80}}, 0x40) 04:24:13 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000000)={'erspan0\x00', {0x2, 0x4e20, @loopback}}) socket$key(0xf, 0x3, 0x2) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@local, @in=@remote}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x0, 0x22}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 04:24:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xf0000000000000}}, 0x40) 04:24:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xd700, 0x6}]}, 0x44}}, 0x0) [ 1452.849056] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:14 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x179) 04:24:14 executing program 3: syz_read_part_table(0x10000000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xa00000000000000) 04:24:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x100000000000000}}, 0x40) 04:24:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xd800, 0x6}]}, 0x44}}, 0x0) 04:24:14 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000340)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYPTR]) chdir(&(0x7f0000000380)='./bus\x00') r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000000)={0x1, 0x0, 0x8, 0x4, 'syz1\x00', 0x1}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f00000000c0)={0x14, r3, 0x31f}, 0x14}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x24, r3, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY_RETRY_SHORT={0x5, 0x3d, 0x7}, @NL80211_ATTR_WIPHY_COVERAGE_CLASS={0x5, 0x59, 0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x4004081}, 0x40004) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x401c5820, 0x0) 04:24:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x180000000000000}}, 0x40) [ 1453.530858] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1453.547003] overlayfs: missing 'lowerdir' 04:24:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xd900, 0x6}]}, 0x44}}, 0x0) 04:24:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xe00000000000000) [ 1453.588412] audit: type=1804 audit(1584764654.752:148): pid=2112 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir305200471/syzkaller.bwUfoC/2268/bus/file0" dev="sda1" ino=17329 res=1 04:24:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8}, [@IFLA_GTP_PDP_HASHSIZE={0x8}]}}}}]}, 0x48}}, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r3, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000440)={0x5, 0xe5, 0x2, 0x0, 0x0, [{{r3}, 0x8}, {{r0}, 0x7f}]}) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0), &(0x7f0000000580)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f0000000100)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) r6 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r6, 0x113, 0x1, &(0x7f0000000040), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@multicast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) sendmsg$nl_route_sched(r6, &(0x7f0000000800)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)=@gettfilter={0x64, 0x2e, 0x400, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r7, {0x7}, {0xfff1, 0x7}, {0xfff2, 0x4}}, [{0x8, 0xb, 0x9}, {0x8, 0xb, 0x7}, {0x8, 0xb, 0x10001}, {0x8, 0xb, 0x325c23df}, {0x8, 0xb, 0x2}, {0x8, 0xb, 0x101}, {0x8, 0xb, 0x3}, {0x8, 0xb, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x8805) r8 = getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000300)={0xa5, 0x7d, 0x2, {{0x0, 0x90, 0x0, 0x0, {0x0, 0x1, 0x2}, 0x20090000, 0x1, 0x8, 0x80, 0x9, 'ip6_vti0\x00', 0x12, 'securitywlan0self)', 0x21, 'system_u:object_r:hald_exec_t:s0\x00', 0x21, 'system_u:object_r:hald_exec_t:s0\x00'}, 0x0, '', 0x0, r5, r8}}, 0xa5) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuseblk\x00', 0x80010, &(0x7f0000000840)=ANY=[@ANYBLOB="66643dc1c1019602e0a7fb9bf4260ad5b86f870e9a474db2396af3a3307ef5dd5f15c069d841d0e7fa3a", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000060000,user_id=', @ANYRESDEC=r4, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB=',max_read=0x0000000000000100,max_read=0x0000000000000f89,default_permissions,allow_other,max_read=0x0000000000000008,blksize=0x0000000000000600,default_permissions,blksize=0x0000000000001000,max_read=0x0000000000000007,obj_user=,smackfsroot=gtp\x00,uid<', @ANYRESDEC=0xee00, @ANYBLOB=',smackfsfloor=gtp\x00,smackfstransmute=self,\x00']) 04:24:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xda00, 0x6}]}, 0x44}}, 0x0) [ 1453.747144] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x200000000000000}}, 0x40) [ 1453.833897] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:15 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x17a) 04:24:15 executing program 3: syz_read_part_table(0x1f000000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xdb00, 0x6}]}, 0x44}}, 0x0) 04:24:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xf00000000000000) 04:24:15 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x700000000000000}}, 0x40) 04:24:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000640)='vfat\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x80000, &(0x7f0000000b40)={[{@uni_xlateno='uni_xlate=0'}]}) 04:24:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xdc00, 0x6}]}, 0x44}}, 0x0) [ 1454.500584] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:15 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x800000000000000}}, 0x40) 04:24:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x2000000000000000) 04:24:15 executing program 0: socket$inet6(0xa, 0xb, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) preadv(r3, &(0x7f0000001580)=[{&(0x7f0000000740)=""/191, 0xbf}, {&(0x7f00000001c0)=""/253, 0xfd}, {&(0x7f0000001a00)=""/4073, 0xfe9}], 0x3, 0x0) perf_event_open(0x0, r2, 0x0, r3, 0x0) listen(r0, 0x6) r4 = socket$inet(0x2, 0x4000000000000001, 0xfffffc01) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) r5 = accept(r0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="29776c330ebb34c6098bf94a99462b1f0000000000000000008e1d2a5539cf3d49a335b500002a143ed4c24ef701154254629ab1dc4a290f9a"], 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r6, 0x0, r7) ioctl$VIDIOC_OVERLAY(r6, 0x4004560e, &(0x7f0000000340)=0x8) sendmmsg(r1, &(0x7f0000000ac0)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80)}}, {{&(0x7f0000000800)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x40}}, 0x8}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000980)}, {&(0x7f0000000a00)="7ab77975bdf273747b63d7a79e38430ebfc9b40e32ff9b76b09eb3c751718bd37b1f675fd05cb54b73e13cdfbfc44399ef7d60a484d1f68b154bc5249f94eba0a6301ca20b106f54f9770659b54325f043fd83ebf15f9639cadeb73967dabc9abbf2628635d20b1879bef621d87f2837eedb1a2a3a04aeac148ec1e37aa012b322ecf89abda674d8fc9873d5b99f07281ed1139c72f0bd84bed6d1fb7760ff50", 0xa0}], 0x2}}], 0x2, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r8, 0x0, r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r9, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="d838ed6e052b6211218092bbe1933bfd"}]}, &(0x7f0000000180)=0x10) r10 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r10, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r9, 0x84, 0x7c, &(0x7f0000000280)={r11}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f00000002c0)={r11, 0x3}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000480)={r12, @in6={{0xa, 0x4e21, 0x7, @rand_addr="f56e253f3155d0dec2627b5a596a400b", 0xfffffffa}}, 0x5b, 0x6, 0x5, 0x3, 0xc53}, &(0x7f0000000540)=0x98) 04:24:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xdd00, 0x6}]}, 0x44}}, 0x0) [ 1454.625503] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:15 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x900000000000000}}, 0x40) [ 1454.695248] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1454.986969] dccp_close: ABORT with 20 bytes unread 04:24:16 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x17b) 04:24:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x2116000000000000) 04:24:16 executing program 3: syz_read_part_table(0x20000000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xde00, 0x6}]}, 0x44}}, 0x0) 04:24:16 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xa00000000000000}}, 0x40) 04:24:16 executing program 0: ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$uhid(0xffffffffffffff9c, 0x0, 0x802, 0x0) dup3(0xffffffffffffffff, r1, 0x0) io_submit(0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000ff7f00009830"], 0x2000, 0x0) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x1, 0x800) fchdir(0xffffffffffffffff) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x2) connect$pptp(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) 04:24:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xdf00, 0x6}]}, 0x44}}, 0x0) 04:24:16 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xc00000000000000}}, 0x40) [ 1455.479106] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x4800000000000000) 04:24:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xe000, 0x6}]}, 0x44}}, 0x0) [ 1455.616770] IPVS: ftp: loaded support on port[0] = 21 04:24:16 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xd00000000000000}}, 0x40) [ 1455.675913] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:16 executing program 3: syz_read_part_table(0x23000000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:17 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x17c) 04:24:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x4c00000000000000) 04:24:17 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xe00000000000000}}, 0x40) 04:24:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xe100, 0x6}]}, 0x44}}, 0x0) 04:24:17 executing program 3: syz_read_part_table(0x2a000000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xffffffff, 0x400040) accept4$unix(r2, 0x0, &(0x7f0000000100), 0x80000) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x8c4b815a5465c2b2, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000017c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001a80)={0x20, r4, 0x4e559e2353b8c5d5, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x224, r4, 0x330, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7fff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x10001}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfffffffe}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xa4d}]}, @TIPC_NLA_MEDIA={0x110, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x21d9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffb6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4de}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0xac, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffb}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x57}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffe1}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}]}, 0x224}, 0x1, 0x0, 0x0, 0xc080}, 0x44000) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000014c0)={0x18, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, [@call={0x85, 0x0, 0x0, 0x17}, @alu={0x7, 0x0, 0x2, 0x1, 0xb, 0x4, 0xfffffffffffffff0}]}, &(0x7f0000000400)='GPL\x00', 0x4, 0x1000, &(0x7f0000000440)=""/4096, 0x100, 0x1, [], 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000001440)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0xf, 0x9, 0x5}, 0x10, 0xffffffffffffffff, r6}, 0x78) 04:24:17 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xf00000000000000}}, 0x40) 04:24:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xe200, 0x6}]}, 0x44}}, 0x0) [ 1456.363182] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:17 executing program 0: ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc408, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000200)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, 0x0, 0x80000) socket$tipc(0x1e, 0x5, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) io_setup(0x0, &(0x7f0000000000)=0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) io_submit(r1, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$VIDIOC_DBG_G_REGISTER(r4, 0xc0385650, &(0x7f0000000000)={{0x4, @addr=0xfff}, 0xfffffffffffffd9b, 0x3, 0x1f}) open(&(0x7f0000021000)='./file0\x00', 0x440000, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) getpid() getpid() pipe(0x0) connect$pptp(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) 04:24:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x6000000000000000) 04:24:17 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1800000000000000}}, 0x40) 04:24:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xe300, 0x6}]}, 0x44}}, 0x0) [ 1456.580209] IPVS: ftp: loaded support on port[0] = 21 [ 1456.716726] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1456.887511] IPVS: ftp: loaded support on port[0] = 21 04:24:18 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x17d) 04:24:18 executing program 3: syz_read_part_table(0x3f000000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xe400, 0x6}]}, 0x44}}, 0x0) 04:24:18 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1a00000000000000}}, 0x40) 04:24:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x6800000000000000) 04:24:18 executing program 0: ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc408, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000200)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, 0x0, 0x80000) socket$tipc(0x1e, 0x5, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) io_setup(0x0, &(0x7f0000000000)=0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) io_submit(r1, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$VIDIOC_DBG_G_REGISTER(r4, 0xc0385650, &(0x7f0000000000)={{0x4, @addr=0xfff}, 0xfffffffffffffd9b, 0x3, 0x1f}) open(&(0x7f0000021000)='./file0\x00', 0x440000, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) getpid() getpid() pipe(0x0) connect$pptp(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) 04:24:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xe500, 0x6}]}, 0x44}}, 0x0) 04:24:18 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1b00000000000000}}, 0x40) 04:24:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x6c00000000000000) [ 1457.407963] IPVS: ftp: loaded support on port[0] = 21 04:24:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x7400000000000000) 04:24:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xe600, 0x6}]}, 0x44}}, 0x0) 04:24:18 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3e00000000000000}}, 0x40) 04:24:19 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x17e) 04:24:19 executing program 3: syz_read_part_table(0x40000000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x7a00000000000000) 04:24:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xe700, 0x6}]}, 0x44}}, 0x0) 04:24:19 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x4f00000000000000}}, 0x40) 04:24:19 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SOUND_MIXER_WRITE_VOLUME(r1, 0xc0044d00, &(0x7f0000000000)=0x20) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @erspan={{0xb, 0x1, 'erspan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa}]}, 0x40}}, 0x0) 04:24:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000240)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0xa927, 0x2d, 0x0, 0xffffffffffffffff}) r5 = dup(r4) mmap(&(0x7f0000112000/0x1000)=nil, 0x1002, 0x0, 0x12, r5, 0x0) 04:24:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xe800, 0x6}]}, 0x44}}, 0x0) 04:24:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x8000000000000000) 04:24:19 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x7f00000000000000}}, 0x40) 04:24:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xe900, 0x6}]}, 0x44}}, 0x0) [ 1458.403904] ion_mmap: failure mapping buffer to userspace 04:24:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x90efff7f00000000) [ 1458.595658] nla_parse: 5 callbacks suppressed [ 1458.595668] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:20 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x17f) 04:24:20 executing program 3: syz_read_part_table(0x41a9e50b, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:20 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x80ffffff00000000}}, 0x40) 04:24:20 executing program 0: symlink(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='./file0\x00') symlink(&(0x7f0000000100)='./file0/file0\x00', &(0x7f00000001c0)='./file1\x00') r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futimesat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)={{0x77359400}, {r2, r3/1000+10000}}) ioctl$FBIOPUT_CON2FBMAP(r1, 0x4610, &(0x7f0000000200)={0x10, 0x2}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmmsg(r4, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 04:24:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xea00, 0x6}]}, 0x44}}, 0x0) 04:24:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x97ffffff00000000) 04:24:20 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x9b00000000000000}}, 0x40) 04:24:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xeb00, 0x6}]}, 0x44}}, 0x0) 04:24:20 executing program 0: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0xffffffff}, 0x19000, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x0, 0x0) mlockall(0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, 0x0) pipe(0x0) close(0xffffffffffffffff) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4c444, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext={0x37, 0x7182}, 0x8000000200004d1e, 0x800007c}, 0x0, 0x0, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) read$dsp(0xffffffffffffffff, &(0x7f00000000c0)=""/72, 0x48) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x400) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x34, &(0x7f0000356ffc), 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2c, &(0x7f0000356ffc)=0x1, 0x4) write$binfmt_misc(r1, &(0x7f0000000340)=ANY=[@ANYRES16, @ANYPTR=&(0x7f0000000300)=ANY=[@ANYRES64], @ANYBLOB="b26b083d2a803fe918070046173b08bd997d8c640ae864dc8f9d593163b1976eb55f796224d22003953d67867ddc53030d2c70baaf51f10a057408d37ca547dff4703e766f3069b07dcfcd6b97beef40ab3c056647ba1cb1467000018451bb086b931270610c1f2aea6d6201e2f8eb139d1a871c0d5861db1c60e86522cf95bb5c0ec5cb53fe1257f4da8a30807a3eaf715ecae82e0b7b0c2bd2f6652358d7033e", @ANYRES32=0x0], 0xaf) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 1459.223672] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x9effffff00000000) 04:24:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xec00, 0x6}]}, 0x44}}, 0x0) 04:24:20 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) [ 1459.418750] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:21 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x180) 04:24:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xf0ffffff00000000) 04:24:21 executing program 3: syz_read_part_table(0x48000000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:21 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x2}}, 0x40) 04:24:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xed00, 0x6}]}, 0x44}}, 0x0) 04:24:21 executing program 0: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x5890, 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='bpf\x00', 0x824831, 0x0) 04:24:21 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x7}}, 0x40) 04:24:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xee00, 0x6}]}, 0x44}}, 0x0) [ 1460.094748] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:21 executing program 0: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc50c4, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x5890, 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='bpf\x00', 0x824831, 0x0) 04:24:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xf5ffffff00000000) 04:24:21 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x8}}, 0x40) 04:24:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xef00, 0x6}]}, 0x44}}, 0x0) [ 1460.355919] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:22 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x181) 04:24:22 executing program 3: syz_read_part_table(0x4b534452, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xf000, 0x6}]}, 0x44}}, 0x0) 04:24:22 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x9}}, 0x40) 04:24:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xfcffffff00000000) 04:24:22 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x7}}, 0x40) 04:24:22 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xa}}, 0x40) 04:24:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xf100, 0x6}]}, 0x44}}, 0x0) [ 1461.013570] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xffffff7f00000000) 04:24:22 executing program 0: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = socket(0x80000000000000a, 0x2, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000ee0206bc4a55f171f3550888709dcd8b77de1763b3c084cde1dc25aacb61b4a55804ae70a7cd1ea47022d6857548e1bad87c290d0219632326117bea01dd9b41aac34db15206accd9c847408648b8cd40f4a1c", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000000)={r7}, 0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={r7, 0x2, 0x81, 0x10001, 0x5, 0x3}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000180)={r8, 0x0, 0x2, [0x3, 0x7f]}, 0xc) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000000)={r8, 0x2}, 0x8) r9 = dup(r4) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x8100, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb, 0x1, 'macsec\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_INC_SCI={0x5}]}}}, @IFLA_LINK={0x8, 0x5, r10}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x4c}}, 0x0) 04:24:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xf200, 0x6}]}, 0x44}}, 0x0) 04:24:22 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xc}}, 0x40) [ 1461.257345] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:23 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x182) 04:24:23 executing program 3: syz_read_part_table(0x4c000000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0xfffffffffffff000) 04:24:23 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xd}}, 0x40) 04:24:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xf300, 0x6}]}, 0x44}}, 0x0) 04:24:23 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xe}}, 0x40) 04:24:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xf400, 0x6}]}, 0x44}}, 0x0) 04:24:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0x401, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x1b9440, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r3, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) getsockopt$inet6_tcp_buf(r3, 0x6, 0x19, 0x0, &(0x7f00000000c0)) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='cubic\x00', 0x6) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r4, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) r5 = dup3(r4, r0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[]}}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r6, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x20004081}, 0x800) 04:24:23 executing program 0: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) socket$bt_bnep(0x1f, 0x3, 0x4) r0 = getuid() chown(&(0x7f0000000200)='./bus/file0\x00', r0, 0x0) 04:24:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xf500, 0x6}]}, 0x44}}, 0x0) 04:24:23 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xf}}, 0x40) 04:24:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x80801, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x3d, 0x0, &(0x7f00000004c0)) setsockopt$inet6_udp_int(r3, 0x11, 0xb, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 1462.280598] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1462.320603] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1462.436073] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 04:24:23 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x183) 04:24:23 executing program 3: syz_read_part_table(0x50617274, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xf600, 0x6}]}, 0x44}}, 0x0) 04:24:23 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x18}}, 0x40) 04:24:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) r2 = socket(0x29, 0x6, 0x816) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f00000000c0)={0x14, r4, 0x31f}, 0x14}}, 0x0) sendmsg$NL80211_CMD_GET_STATION(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, r4, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@NL80211_ATTR_STA_TX_POWER={0x6, 0x114, 0xa95}, @NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5, 0xe4, 0x1}, @NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5}, @NL80211_ATTR_STA_SUPPORTED_RATES={0xd, 0x13, "fa739c5adabb595b9f"}, @NL80211_ATTR_STA_CAPABILITY={0x6, 0xab, 0x81}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xffff, 0x3}}]}, 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x4004040) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYRES16=r1], 0x1}, 0x1, 0x0, 0x0, 0x40044}, 0x20048008) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:24:23 executing program 0: open(0x0, 0x0, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000080)="0f0147d1d1861900000f23c80f21f8350000e0000f23f8b9190b0000b8ba690000ba000000000f308fe938028d2f000000f30f2cc0b805000000f9e0a264df0f01c166ba4300ecc744240000000000c7442402bc0c0000c7442406000000000f011c24c4c11972d000", 0x69}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) creat(0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000040), 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x1}]}, 0x1c}}, 0x0) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x7c, r2, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @loopback}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_PEER_V6={0x14, 0x9, @dev={0xfe, 0x80, [], 0x33}}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e21}, @FOU_ATTR_PEER_V6={0x14, 0x9, @ipv4={[], [], @broadcast}}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4000088}, 0x20048000) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents(r3, &(0x7f0000000000)=""/62, 0xd6147cbb6f273a13) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$SNDCTL_DSP_GETFMTS(0xffffffffffffffff, 0x8004500b, &(0x7f0000000240)=0x1000) 04:24:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1a}}, 0x40) 04:24:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup3(r0, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:24:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xf700, 0x6}]}, 0x44}}, 0x0) 04:24:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1b}}, 0x40) [ 1463.000143] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:24 executing program 0: syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0}, {0x0, 0x0, 0x1}], 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x3, 0xffffffffffffffff, 0x8) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x20a000, 0x0) 04:24:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r3, 0x113, 0x1, &(0x7f0000000040), 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x2, &(0x7f0000000040)='nodev\x00', 0x6) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:24:24 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x184) 04:24:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xf800, 0x6}]}, 0x44}}, 0x0) 04:24:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x3e}}, 0x40) 04:24:24 executing program 3: syz_read_part_table(0x5244534b, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:24 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) write$tun(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x8b) 04:24:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f00000000c0)={[{0x8, 0x9, 0x5, 0x6, 0xe8, 0x4, 0x3, 0x3, 0xf8, 0x6, 0x3f, 0x8, 0x3}, {0x5, 0x2, 0xfd, 0x4b, 0x4, 0xfa, 0x7f, 0x6, 0x80, 0x2, 0x4, 0x5, 0xb3f}, {0xff, 0x2000, 0x9, 0x1, 0x80, 0x1, 0x3b, 0x7, 0x1f, 0x80, 0x7, 0x0, 0x3}], 0x3}) r3 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/checkreqprot\x00', 0x183001, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r9, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) io_submit(0x0, 0x5, &(0x7f00000008c0)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x3, 0x8b, 0xffffffffffffffff, &(0x7f0000000140)="d758eecb0d77c10b62fc3d57b438357f2699c084b21e037f33096e0c047113a8015786894530de9151befe0f665e2c867e4b015828be4d9a48577e24779dffebd14005eefd8f2c98a8782ce0f2ce8870658629927e7167f0082a50fe78a984365b56e77e9257b47bee2f5581fc32eb1bb5adb2046dfc97e0c6a539dc0dc7c298bb46a910ca89b0422c4c116f8d631db39e9b126c73", 0x95, 0x6, 0x0, 0x1, r5}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9, r2, &(0x7f0000000340)="f2ae60337580dedfd3815a3fdf490fbd8abcdf1e3e35ebbb430ac2d3f7f734d795e29cbe909be1ad7f8978cd296d36f809207f13bb05328967c26874d229913ce23bf1488f4efe941d68277c186608822df37e171065522d3da6dd226a8610d0edfeb304da34feadb85ac440479489a18f", 0x71, 0xfffffffffffffffe, 0x0, 0x2, r7}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x37, r0, &(0x7f0000000400)="ad929541676efa716bc7b0e855e0b7b53d3db2a74999a11afc4d44dceb311bd81e4eb7c680bbe2adfd914aff7955e7904fe398afff9839fcd2d2ffee496f1169d655daff9675707fbe286c10cd811aea988291b8e3108f81562b1861bb816135", 0x60, 0x1, 0x0, 0x2}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x3, 0x1, r3, &(0x7f00000004c0)="7fb6a13af25c7bfa1e30a54ea089c60c0437b8a36fa1aaf10e291023a1", 0x1d, 0x9, 0x0, 0x2, r8}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x1, 0x0, r9, &(0x7f0000000580)="895a3bf891fe53e64c38f88aa97a7884d305e3f39b6cae626e00c5c20206eac143da8d0e2e3afe4c3147f6bc4fe1aebd209cb948e37a82f718f08191948df7ccb7c5c1608381fb1c8df0ae2f9ffadbb1a85f6e40a91ef244e310cbd6529e020801cd23be6fd35c3cca414fa210b9", 0x6e, 0x800000000000, 0x0, 0x2, r3}]) prctl$PR_GET_DUMPABLE(0x3) 04:24:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xf900, 0x6}]}, 0x44}}, 0x0) [ 1463.780271] nla_parse: 2 callbacks suppressed [ 1463.780281] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:25 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x4f}}, 0x40) 04:24:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xfa00, 0x6}]}, 0x44}}, 0x0) 04:24:25 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x9b}}, 0x40) 04:24:25 executing program 3: syz_read_part_table(0x52450000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xfb00, 0x6}]}, 0x44}}, 0x0) [ 1464.339787] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:25 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x185) 04:24:25 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xf0}}, 0x40) 04:24:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xfc00, 0x6}]}, 0x44}}, 0x0) 04:24:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYRESOCT], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x0, 0x0, 0x24048890}, 0x0) 04:24:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in=@broadcast, @in6}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @netrom, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) ioctl$DRM_IOCTL_IRQ_BUSID(0xffffffffffffffff, 0xc0106403, &(0x7f00000001c0)) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000180)) getpeername$inet6(r1, &(0x7f0000000880)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000008c0)=0x1c) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000740)='/dev/nvme-fabrics\x00', 0x10200, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") accept$netrom(0xffffffffffffffff, &(0x7f00000006c0)={{0x3, @null}, [@remote, @remote, @default, @bcast, @null, @netrom, @null, @netrom]}, &(0x7f0000000280)=0x48) io_setup(0x100000009, &(0x7f0000000080)=0x0) io_destroy(r3) 04:24:25 executing program 3: syz_read_part_table(0x55000000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:25 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x180}}, 0x40) 04:24:25 executing program 2: r0 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={0x0, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) keyctl$update(0x2, r0, &(0x7f0000000080)="5a13a600a80a5f9ef74a0cc2004c67bac276cf3592c3dc3f677ebbcc1014b67b72382822bc97cf1a2aa96408c2fe1b648000692a955e30d568ddf91554f53d78494c87322152c87ce5512cf519fa23b4404fc82c5c48c5dbddf7097e90b821a195b0b5e9477d6322d23f505e2b0f07216e49e797aaf0a424", 0x78) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x8004) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) writev(r3, &(0x7f0000000180)=[{&(0x7f00000002c0)="6e988ca6009c37df06c4cdd31a1560abc0e3c35b82e5521da7cf9ce6c51aeac559059d1946fcdd1e272b6a55575b9c37ed5ea80f39c4eb3c2ce48b1523c7d11c25ae8d9bbe9a3c04f91561b59af620d3d3332ae146a690406a81e3be8a389527c839ba76759abdc1d6fd676cab2e0cdff0c8619fd2a460f172e12f9bf05b1dc046e9a949b11afacabaa6314467", 0x8d}, {&(0x7f0000000480)="0f492b439ac859ef35fcc25a32c4ab4e1b6161e7719082e5d9cedb7cc846d7373a612420e1fe86937f108dff7d91a7f455cb73f2739c859b938cea36f0d4824c55cf937773461838e5f28d6470203a985aea68fdf13044383107b7d4822ad1b9c42af4a9b8218cc618e3e87cb8800e84f099a4505b2ce2734a497629078a8cf243a4fd3b2fc21290c1", 0x89}, {&(0x7f0000000540)="fe766757a0e37f90995b905daccb03c2fbdd0d5e21e6530d803d1d66bdf37d9f5ba3bd8285c6e10bfa6f8c4876ae198ee9933c7f84bf20080151563c4ed2fb82a825ff56691be596e7945f6ad9fe0f2629fddd4926d8e6f54dbb6e0124c0541d33232853917db9511817c2b298f0dac97256ca3255328bc59f834f2a379de0bd4f6d86c14eb693139f7ffc5e7fe19ba78df4e26e5613594827c800e3f5dc108110ab1f2baf9475ca208a08e632775a9ac17ddd0eae17424227066061dafb0aa60200e938c7c8", 0xc6}, {&(0x7f00000008c0)="30dde853109bf16d321e56fcdaead127878f750d99e5b1ead6200f310d777bdbda745542fe351471d27a323931e86c7cb774a74e27417fa79743ae94d955b225774075b3940b0c252a866e780e2d6627444c3581a2716f1a0c2018e884c2c95bffe33e3f46d16a8cb90072438682e240ea118fd46ad8798e8521aa17106521a438315c011ca6159808d0bf392d77687b3ab2073a75e5d54114", 0x99}], 0x4) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) ioctl$sock_SIOCSIFBR(r3, 0x8941, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000140)='bridge_slave_0\x00'}) 04:24:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xfd00, 0x6}]}, 0x44}}, 0x0) [ 1464.717127] IPVS: ftp: loaded support on port[0] = 21 [ 1464.774632] audit: type=1400 audit(1584764665.932:149): avc: denied { getattr } for pid=2705 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=socket permissive=1 04:24:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xfe00, 0x6}]}, 0x44}}, 0x0) 04:24:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r4, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) ioctl$sock_inet6_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000040)) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:24:26 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x700}}, 0x40) [ 1464.965950] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1465.032744] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1465.040680] IPVS: ftp: loaded support on port[0] = 21 04:24:26 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x186) 04:24:26 executing program 3: syz_read_part_table(0x55aaffff, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0xff00, 0x6}]}, 0x44}}, 0x0) 04:24:26 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x900}}, 0x40) 04:24:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:24:26 executing program 0: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000080)='coda\x00', 0x8, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000380)={0x9a0000, 0x674a, 0x0, r2, 0x0, &(0x7f0000000340)={0x98091c, 0x0, [], @p_u8=&(0x7f0000000100)=0x5f}}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4) r4 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r4, 0x7, &(0x7f0000027000)={0x1, 0x0, 0x0, 0x9}) unshare(0x40600) r5 = gettid() write$9p(r4, &(0x7f0000000180)="16", 0x1) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f00000003c0)={0x0, 0x5}, &(0x7f0000000400)=0x8) write$FUSE_IOCTL(r4, &(0x7f00000001c0)={0x16}, 0x20) tkill(r5, 0x1000000000016) [ 1465.536324] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0xb}]}, 0x44}}, 0x0) 04:24:26 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xa00}}, 0x40) 04:24:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r4, 0x113, 0x1, &(0x7f0000000040), 0x0) accept4$llc(r4, 0x0, &(0x7f0000000040), 0x400) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:24:26 executing program 0: r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000040), 0x0) r1 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r1, 0x113, 0x1, &(0x7f0000000040), 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000180)=0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000006380)={&(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1}}, 0x44000) 04:24:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0xf}}, 0x0) 04:24:26 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xc00}}, 0x40) [ 1465.839128] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1465.897377] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:27 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x187) 04:24:27 executing program 3: syz_read_part_table(0x56abffff, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0xc0}}, 0x0) 04:24:27 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xd00}}, 0x40) 04:24:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDDISABIO(r1, 0x4b37) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="1020f5f2", 0x4, 0x1400}], 0x0, 0x0) 04:24:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) sendto$packet(0xffffffffffffffff, &(0x7f0000000480)="33f83cd6c709441c92dc8947c76acad9442f2f22e23d1c4c02308d4fa6bf026df733832c757b30c5e5f0829062022ba62ecc89ed9e932d8ec0df7db8c8f2b798b3d777f74f1f4b991cb7db07827e1d9d01fa953fb3c224e98797f7482ea21b18ae95dc1d514b87c96360d0222d533bbafebae2e559b15ffd369b7eb5d95a4e1ac8b2926851598bec6a899bb32733b4e74e53958bc82a8b4e1d877fa2438ae16c5543bae938e3ee0d14d41541e077e40966fb138d7633a4ed019258fbd128f3", 0xbf, 0x8010, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x8, 0x6, @dev={[], 0x27}}, 0x14) keyctl$update(0x2, r5, &(0x7f0000000240)="db40951195b6532950", 0x9) r6 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r5, r6, r5}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r7 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, r7, &(0x7f00000000c0)=""/18, 0x12) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000340)="18faca5ce30009dc7792", 0x2f03fc7e454c7ecb, r7) keyctl$link(0x8, r6, r7) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000180)={'vlan0\x00', {0x2, 0x4e24, @rand_addr=0x8d0}}) openat$cgroup_type(r4, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) 04:24:27 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xe00}}, 0x40) [ 1466.441773] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0xec0}}, 0x0) 04:24:27 executing program 0: ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, 0x0) r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) connect(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x2}, 0x80) sendmmsg(r0, &(0x7f0000001540), 0x553, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) mknod(&(0x7f0000000200)='./file0\x00', 0x100, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x7f, 0x2, 0xf6, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x19000, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x8000}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x14) r2 = dup2(0xffffffffffffffff, r1) accept4$tipc(0xffffffffffffffff, &(0x7f0000000080)=@id, &(0x7f00000001c0)=0x10, 0x0) semget$private(0x0, 0x0, 0x0) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x420) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000000) getsockopt$inet_dccp_buf(r2, 0x21, 0xd, &(0x7f0000000c80)=""/4096, &(0x7f0000000100)=0x1000) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0xff}, 0x8000000200000f1e, 0x7, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) syz_mount_image$ext4(0x0, 0x0, 0x9, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) getsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000400), 0x0) [ 1466.515487] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:24:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x33fe0}}, 0x0) 04:24:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x10, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, 0x0, 0x4001) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0xffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r0, 0x6, 0x11, &(0x7f0000000080)=0x20, 0xffffffffffffffaa) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000380)=0x2, 0x4) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x7d6a591eedaef62b}, 0xfffffe36) connect$unix(r2, &(0x7f0000000100)=@abs, 0x6e) [ 1466.736031] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:28 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x188) 04:24:28 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xf00}}, 0x40) 04:24:28 executing program 3: syz_read_part_table(0x57290300, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x20000104}}, 0x0) 04:24:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r1, 0x113, 0x1, &(0x7f0000000040), 0x0) r2 = accept4$llc(r1, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000000c0)=0x10, 0x80000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r3, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r5, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYRES16=r0], 0x1}}, 0x804) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r6, &(0x7f0000000040)={0x0, 0xfffffffffffffc6f, &(0x7f0000000200)={0x0, 0xfffffffffffffd37}, 0x8}, 0x4001) 04:24:28 executing program 0: socket$inet(0x2, 0x2, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000040), 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f00000017c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001a80)={0x20, r2, 0x4e559e2353b8c5d5, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x7c, r2, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x18, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3b}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1fef}]}, @TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x80000000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4018adec}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xffff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4b}]}, @TIPC_NLA_NODE={0x14, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x39d}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7e5dc170}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x44810}, 0x804) r3 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r3, 0x113, 0x1, &(0x7f0000000040), 0x0) accept4$ax25(r3, &(0x7f0000000000)={{}, [@remote, @bcast, @remote, @netrom, @remote, @rose, @remote, @rose]}, &(0x7f0000000080)=0x48, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x10000101, 0x2) clone(0x0, 0x0, 0x0, 0x0, 0x0) 04:24:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x7ffff000}}, 0x0) 04:24:28 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1800}}, 0x40) 04:24:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:24:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0xfffffdef}}, 0x0) 04:24:28 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1a00}}, 0x40) 04:24:28 executing program 3: syz_read_part_table(0x57455682, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:29 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x189) 04:24:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x4c, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="50000000100005076c00"/20, @ANYRES32=0x0, @ANYBLOB="00200200030000001c0012000b0001006970766c616e00100c00020006000100020000000a000500340000000000000008000a00", @ANYRES32, @ANYBLOB="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"], 0x50}}, 0x0) r0 = socket$bt_bnep(0x1f, 0x3, 0x4) flistxattr(r0, &(0x7f0000000700)=""/4096, 0x1000) semget$private(0x0, 0x0, 0x0) socket(0x10, 0x80002, 0x0) r1 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r1, 0x113, 0x1, &(0x7f0000000040), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="0100000000000000000001000000fe06eddb0500040001000000"], 0x1c}}, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r4, 0x8, 0x70bd2d, 0x2, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4043}, 0x4040) sendmsg$FOU_CMD_ADD(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @rand_addr=0x7fffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000080}, 0x20040010) times(&(0x7f0000000080)) socketpair$unix(0x1, 0x0, 0x0, 0x0) r5 = socket(0x10, 0x80002, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r5, 0x8912, &(0x7f0000000040)=@buf) sendmmsg$alg(r5, &(0x7f00000000c0), 0x492492492492627, 0x0) 04:24:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400202) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac3ef2c37c4628818a318d1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800611a50000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23"], 0x70}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r6, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) fstat(r2, &(0x7f0000000080)) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_capability(r6, &(0x7f0000000040)='security.capability\x00', &(0x7f00000002c0)=@v3={0x3000000, [{0x4, 0x10001}, {0xfffffbff, 0x8000}], r7}, 0x18, 0x1) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SETDUPLEX(r9, 0x5016, 0x0) 04:24:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x5}, 0x0) 04:24:29 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1b00}}, 0x40) 04:24:29 executing program 3: syz_read_part_table(0x68000000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x6}, 0x0) 04:24:29 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x3e00}}, 0x40) 04:24:29 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 1468.407459] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 04:24:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x8}, 0x0) [ 1468.512837] bridge1: port 1(ipvlan2) entered blocking state 04:24:29 executing program 3: syz_read_part_table(0x6b6b6b00, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r3, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f00000000c0)={0x9c0000, 0x4, 0x9, r3, 0x0, &(0x7f0000000080)={0x3b00bfc6b67e7ae8, 0x401, [], @p_u16=&(0x7f0000000040)=0x4}}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x8e1) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 1468.513206] bridge1: port 1(ipvlan2) entered disabled state 04:24:30 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x18a) 04:24:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x9}, 0x0) 04:24:30 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x4f00}}, 0x40) 04:24:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x4c, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="50000000100005076c00"/20, @ANYRES32=0x0, @ANYBLOB="00200200030000001c0012000b0001006970766c616e00100c00020006000100020000000a000500340000000000000008000a00", @ANYRES32, @ANYBLOB="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"], 0x50}}, 0x0) r0 = socket$bt_bnep(0x1f, 0x3, 0x4) flistxattr(r0, &(0x7f0000000700)=""/4096, 0x1000) semget$private(0x0, 0x0, 0x0) socket(0x10, 0x80002, 0x0) r1 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r1, 0x113, 0x1, &(0x7f0000000040), 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="0100000000000000000001000000fe06eddb0500040001000000"], 0x1c}}, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r4, 0x8, 0x70bd2d, 0x2, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4043}, 0x4040) sendmsg$FOU_CMD_ADD(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @rand_addr=0x7fffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000080}, 0x20040010) times(&(0x7f0000000080)) socketpair$unix(0x1, 0x0, 0x0, 0x0) r5 = socket(0x10, 0x80002, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r5, 0x8912, &(0x7f0000000040)=@buf) sendmmsg$alg(r5, &(0x7f00000000c0), 0x492492492492627, 0x0) 04:24:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r4, 0x113, 0x1, &(0x7f0000000040), 0x0) r5 = accept4$phonet_pipe(r4, &(0x7f00000001c0), &(0x7f0000000300)=0x10, 0x800) getsockopt$PNPIPE_ENCAP(r5, 0x113, 0x1, &(0x7f0000000340), &(0x7f0000000380)=0x4) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f00000000c0)={0x14, r7, 0x31f}, 0x14}}, 0x0) sendmsg$NL80211_CMD_SET_BSS(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, r7, 0x8, 0x70bd29, 0x25dfdbff, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_BSS_HT_OPMODE={0x6, 0x6d, 0x5}, @NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5, 0x1d, 0x6}, @NL80211_ATTR_BSS_SHORT_SLOT_TIME={0x5, 0x1e, 0x3}, @NL80211_ATTR_P2P_OPPPS={0x5, 0xa3, 0x1}, @NL80211_ATTR_BSS_CTS_PROT={0x5}, @NL80211_ATTR_BSS_HT_OPMODE={0x6, 0x6d, 0x401}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20004005}, 0x4040004) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0xd}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r8, &(0x7f0000000040)="a9"}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r8, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x23, 0x7, 0x10000, 0xffffffffffff7fff}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r9, 0x2, 0x18}, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:24:30 executing program 3: syz_read_part_table(0x6c000000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0xa}, 0x0) 04:24:30 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x7f00}}, 0x40) [ 1469.309690] nla_parse: 11 callbacks suppressed [ 1469.309700] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1469.325586] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1469.443129] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 04:24:30 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x9b00}}, 0x40) 04:24:30 executing program 3: syz_read_part_table(0x74000000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0xb}, 0x0) 04:24:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x0, 0x0, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-monitor\x00', 0x400, 0x0) r4 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r4, 0x113, 0x1, &(0x7f0000000040), 0x0) r5 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r5, 0x113, 0x1, &(0x7f0000000040), 0x0) r6 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f00000002c0), 0x0) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000500)) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180), 0x0, 0x3}}, 0xfffffffffffffd44) r7 = dup3(r6, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESDEC=r2], @ANYRESHEX, @ANYRES64]], 0x1}}, 0x1) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x64, 0x0, 0x20, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3ff}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xb}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x24000800}, 0x4004880) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r8, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 1469.649660] bridge1: port 1(ipvlan2) entered blocking state [ 1469.673518] bridge1: port 1(ipvlan2) entered disabled state 04:24:31 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x18b) 04:24:31 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xf000}}, 0x40) 04:24:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x10}, 0x0) 04:24:31 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) r3 = syz_open_procfs(r2, &(0x7f0000000000)='cpuset\x00') sendfile(r1, r3, &(0x7f00000000c0)=0x9, 0xffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000040)=0x0) write$FUSE_LK(r3, &(0x7f0000000080)={0x28, 0x0, 0x2, {{0xd0, 0x1, 0x0, r6}}}, 0x28) creat(0x0, 0x0) 04:24:31 executing program 3: syz_read_part_table(0x74726150, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:24:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x300}, 0x0) 04:24:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) fgetxattr(r2, &(0x7f0000000080)=@random={'trusted.', '.,&vboxnet0keyringcgroup^wlan1selfmd5sumcpuset^eth1user\x00'}, &(0x7f00000000c0)=""/148, 0x94) r3 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r4 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r4, 0x113, 0x1, &(0x7f0000000040), 0x0) bind$phonet(r4, &(0x7f0000000040)={0x23, 0x7f, 0x4}, 0x10) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:24:31 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xf00000}}, 0x40) 04:24:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x500}, 0x0) 04:24:31 executing program 3: syz_read_part_table(0x7a000000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:31 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1000000}}, 0x40) 04:24:32 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x18c) 04:24:32 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1800000}}, 0x40) 04:24:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x600}, 0x0) 04:24:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) renameat2(r1, &(0x7f0000000000)='./file1\x00', r3, &(0x7f0000000040)='./file0\x00', 0x2) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000e, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000000000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) 04:24:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:24:32 executing program 3: syz_read_part_table(0x82564557, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x700}, 0x0) 04:24:32 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x2000000}}, 0x40) 04:24:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f0000000100)='./file0\x00', 0x85c43, 0xa0) mknod(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200018402, 0x800007f, 0x0, 0x3, 0xfffffffffffffffd, 0x0, 0x20}, 0x0, 0x4, 0xffffffffffffffff, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="20000000140001000000000000000000022000007ad50886fcbdf90ce238034ceb3ea54086ec532a13d2d3a4743eeab788850489c4836640f5747869eaa25c72d0b7a16d7b6ddd3e22fc246fb86401db9aa99163a75de8624779639f7160f64362b883d6d49ff6dc9fc1ddcb95cf4f07c19cb54d3918a3b933", @ANYRES32=0x0, @ANYBLOB="08000200e0000001"], 0x20}, 0x1, 0xf0ffffff}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="180000001500010000000000104000000200352759c7ff8e02aca548d08ed11141e56934b03c5a109c9aa39b2be16ec60d95f6d3b43d9b173a05ff28cbe9a8ea3147a2a3e5a4810f96030bbc8c69faea151f22c3c51312b4998a", @ANYRES32=0x0], 0x18}}, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000006f40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000006f00)={&(0x7f0000006e80)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012abd7000fedbdf250100000008000100", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="080002000000000008000800010040000c00030004000000000000ff08000100", @ANYRES32=0x0, @ANYBLOB="08000200000000000800090003000000"], 0x60}}, 0x746817bbe8372710) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000640)={0xa5, 0x7d, 0x2, {{0x0, 0x90, 0x3ff, 0x6, {0x0, 0xfffffffe, 0x2}, 0x20090000, 0x1, 0x8, 0x80, 0x9, 'ip6_vti0\x00', 0x12, 'securit\xb0\x00\x00\x00\x00\x00\x00\x00lf)\xb6\xd1W\x15\xa1\xc4\xbb\f|\x80\x90\xd4\x1b\x96:\x1c\x8d\xa0\xc5\a\xa0\x1d\x9cQ\xdd\xa2\xf2\xfb6\x9095\x98\a\x9dLZ\x97\x8d\x87Y\xbd\xae\xe6\xfc\x1a\xf7tn\x86qm\x03N^\x1aA-\xc8I\xc4\xd9\xfb\x8f\xa6b}\xe5\x80u\xa8\xc3\xd1\x83ht\xffr\xfbo\xba\x86L\xcd\xda\xbb\xb9\xcb\x95\x85\xa3L~\xef\xb8]-\x90\xce\xf1\xd9\xf9rv>\xa7\xb1\xfe{\xd1\x9c\xf7\xd3j\x00\x00\x00\x00\x00\x00\x00\x00', 0xfffffffffffffdba, 'system_u:object_r:hald_exec_t:s0\x00', 0x21, 'system_u:object_r:hald_exec_t:s0\x00'}, 0x0, '', 0x0, r4}}, 0xa5) getgroups(0x2, &(0x7f0000000180)=[r3, r4]) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r5 = open(&(0x7f0000000600)='./bus\x00', 0x22, 0x0) write$P9_RATTACH(r5, &(0x7f0000000080)={0x14}, 0xfffffff4) 04:24:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x900}, 0x0) 04:24:32 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x7000000}}, 0x40) 04:24:32 executing program 3: syz_read_part_table(0xb8110000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 1471.579536] audit: type=1800 audit(1584764672.742:150): pid=3199 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17585 res=0 04:24:33 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x18d) 04:24:33 executing program 3: syz_read_part_table(0xbc0e0000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0xa00}, 0x0) 04:24:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x8000000}}, 0x40) [ 1472.334071] audit: type=1800 audit(1584764673.492:151): pid=3204 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17585 res=0 04:24:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0xb00}, 0x0) 04:24:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x9000000}}, 0x40) 04:24:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f0000000000)={0x4, 0x2}) ioctl$VIDIOC_S_SELECTION(r2, 0xc040565f, &(0x7f0000000000)={0x2, 0x0, 0x1, {0x0, 0x0, 0x1, 0x7}}) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x10094) write$binfmt_script(r1, &(0x7f00000008c0)=ANY=[@ANYRES16], 0x2) write$binfmt_elf64(r1, &(0x7f0000000440)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x1d800) close(r1) 04:24:33 executing program 3: syz_read_part_table(0xbedaffff, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f0000000600)={&(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xcd}) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, &(0x7f00000008c0)={r3, 0x2, 0x4ec, 0xf21, 0xbf, 0x4, 0x0, 0x2, 0x6, 0x7, 0x7ff, 0x8}) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) write$9p(r2, &(0x7f0000000340)="2f911503f85c980804cc10667086901fd0b29d7cb58eb09b7d0c9a1cbffc76025a9b779b890cb6580618ae9860cb05767347eac51cd955b00337b91c85ebc6cba52159ae30bef113d9129df59b7cf90866eb59e55ae0947b74339264b6da0650d6f2e409f7b564fc0221bed26d40e81a3067d45226b1098f0321e5bffb2755f60cc2f037ed20bf8d7179d162de403198d5f5c64fcf50e7890836c9b85bc7eb100a41d3adfbcc06cb2f8bd6b38e50dc9b51e21d58638ea4fa7083ae6a8a2815815ba44bffc6c3926856a31056da50311f8f7af0e7668fc9606a4d695a195a4bd7f5e2f636f88dcf1847df474ed7de7ef5d369", 0xf2) sendmsg$IPCTNL_MSG_CT_GET(r4, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x178}, 0x1, 0x0, 0x0, 0xc894}, 0x20000004) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000580)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xac, 0x2, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x8}, [@IPSET_ATTR_DATA={0x28, 0x7, 0x0, 0x1, [@IPSET_ATTR_SIZE={0x8, 0x17, 0x1, 0x0, 0x100}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e20}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x7f}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @local}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x5}, @IPSET_ATTR_DATA={0x68, 0x7, 0x0, 0x1, [@IPSET_ATTR_CIDR={0x5, 0x3, 0x2}, @IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast2}}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x41}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x400}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e23}, @IPSET_ATTR_PROBES={0x5, 0x15, 0x6}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @loopback}}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x4}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x3}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0xc1}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x10}, 0x40) [ 1472.540923] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xa000000}}, 0x40) 04:24:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0xc00}, 0x0) [ 1472.756133] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:34 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) fremovexattr(0xffffffffffffffff, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/consoles\x00', 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x20000000) shutdown(0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd909}, 0x0) dup(0xffffffffffffffff) fsetxattr(0xffffffffffffffff, &(0x7f0000000300)=@known='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) dup3(r3, r2, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) 04:24:34 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x18e) 04:24:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xc000000}}, 0x40) 04:24:34 executing program 3: syz_read_part_table(0xc9ffffff, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:34 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0xd00}, 0x0) 04:24:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xd000000}}, 0x40) 04:24:34 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0xe00}, 0x0) 04:24:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x8) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 1473.037548] audit: type=1800 audit(1584764674.192:152): pid=3300 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17638 res=0 [ 1473.119606] audit: type=1804 audit(1584764674.222:153): pid=3306 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir305200471/syzkaller.bwUfoC/2301/file0" dev="sda1" ino=17638 res=1 [ 1473.150548] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r7}, @IFLA_IFNAME={0x14, 0x3, 'veth0_vlan\x00'}]}, 0x3c}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000080)=0x4) 04:24:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xe000000}}, 0x40) 04:24:34 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0xf00}, 0x0) 04:24:34 executing program 3: syz_read_part_table(0xf0ffffff, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:34 executing program 0: syz_read_part_table(0x0, 0x22e, &(0x7f0000003800)=[{&(0x7f0000001540)="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", 0x600, 0x800}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) sendfile(r1, r0, &(0x7f0000000000)=0x1, 0x74ff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:24:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x1100}, 0x0) 04:24:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCSISO7816(r6, 0xc0285443, &(0x7f0000000080)={0x8, 0x80, 0x20, 0x7ff, 0x8}) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_IRQCHIP(r4, 0xc208ae62, &(0x7f00000002c0)={0x0, 0x0, @ioapic}) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"/558], 0x70}}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r7, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:24:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xf000000}}, 0x40) 04:24:35 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x18f) 04:24:35 executing program 0: read$usbfs(0xffffffffffffffff, &(0x7f0000000000)=""/18, 0x12) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000080)={0x58e0, 0x14, [{0xa, 0x1}, {0xc, 0x1}, {0xb}, {0x6, 0x1}, {0x2}, {0x0, 0x1}, {0x0, 0x1}, {0x6, 0x1}, {0x0, 0x1}, {0x9, 0x1}, {0xd, 0x1}, {0xa, 0x1}, {0xd, 0x1}, {0x4}, {0xe, 0x1}, {0x4}, {0x7}, {0xf}, {0xa, 0x1}, {0xc, 0x1}]}) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x6, 0x5, 0xfc, 0x0, 0x0, 0x6, 0x840, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x200, 0x4, @perf_bp={&(0x7f00000000c0), 0x8}, 0x80c0, 0x1, 0xff, 0x6, 0x89d, 0xfff, 0xff}, 0xffffffffffffffff, 0x1, r0, 0x12) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000180)=0x1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000240)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/btrfs-control\x00', 0x501, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r3, &(0x7f0000000580)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1ec, r4, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x3c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4c8c}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9a6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1a}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5f2f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3f}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}]}, @TIPC_NLA_SOCK={0x64, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xc5a}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xd9af}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4c73e066}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3f}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xbe}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3f}]}]}, @TIPC_NLA_LINK={0x2c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA={0x90, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffff7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x5c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xd850}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7e8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xe07f}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x101}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}]}]}, 0x1ec}}, 0x4000000) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/autofs\x00', 0x262481, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r5, 0x29, 0x2d, &(0x7f0000000600)={0x4, {{0xa, 0x4e20, 0x3fc, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}}}, 0x88) r6 = gettid() syz_open_procfs(r6, &(0x7f00000006c0)='sessionid\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000700)='net/anycast6\x00') write$FUSE_IOCTL(r7, &(0x7f0000000740)={0x20, 0x0, 0x1, {0x6, 0x4, 0x600, 0xffffffff}}, 0x20) ioctl$int_in(r5, 0x5452, &(0x7f0000000780)=0x10000) r8 = openat$zero(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/zero\x00', 0x48000, 0x0) sendmsg$IPSET_CMD_DEL(r8, &(0x7f00000009c0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000980)={&(0x7f0000000840)={0x110, 0xa, 0x6, 0x201, 0x0, 0x0, {0x5, 0x0, 0x4}, [@IPSET_ATTR_ADT={0x38, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0x7}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x1}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'veth1_vlan\x00'}}]}, @IPSET_ATTR_DATA={0x5c, 0x7, 0x0, 0x1, [@IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0x6}, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x3ff}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @empty}}, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x6b}, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x8}, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x5}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x3f}, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x50, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e24}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @remote}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_COMMENT={0x8, 0x1a, 'eth\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0xfffffff9}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x4}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PROTO={0x5, 0x7, 0x16}}]}, @IPSET_ATTR_ADT={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x2}}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x20000000}, 0x810) setsockopt$inet6_buf(r8, 0x29, 0x2b, &(0x7f0000000a00)="7cf63a14fb2f60aa0e0f52908fe82eae48bada2194be559afc0ecca0d40e3a9691949876c33fc1a9d6b0155361eeda5f2cfef0ba785b428489c42469f1d8d2d9f1a0d6e1292b16c7a056de4c820e5e449e82efefdcec83959883f122de167e9a7f9937417480b4f524d7b0ff52f22d5ed839b8f94f9450ab3b07ed605689def80e4c305fe435442b1a83fb9018efcf", 0x8f) 04:24:35 executing program 3: syz_read_part_table(0xf5ffffff, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x1200}, 0x0) 04:24:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x18000000}}, 0x40) [ 1474.033804] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:35 executing program 0: socket$phonet_pipe(0x23, 0x5, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x200040020a) setuid(0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x1, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x3) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, &(0x7f0000001fd8)=ANY=[], 0x0, 0x10000, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x10, 0x1000, 0xffffffff}, 0x10}, 0x78) ioctl$TIOCMSET(r5, 0x5418, &(0x7f0000000540)=0x38) fadvise64(r6, 0x0, 0x8000, 0x2) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400, 0x0) ioctl$EVIOCGPROP(r7, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f0000000a80)=0x0) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r6, &(0x7f0000000740)={0x4}) kcmp(r8, 0x0, 0x2, r6, r5) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x800, &(0x7f0000000ac0)=ANY=[@ANYBLOB="7f2626e991039ac75e7a2053aecd7befa7b8f25afa0b208d6447cdfa3be748a27546638533cfe5e489af81690d90890a0c4dd9f64f9f493954c993040865c48c8a1bc91f6597d6b15e8225bb4b86d6f6c4f1d533200d3ad974c85653edd00022aafc5d4aaa3be22d6a59e2b078d1eda69c077d7cdef60000c941de38d2c2f2602ed7eb8b9c3b0cb26278001e0ae733afda64f2a53fb8753d5f07a33068d95e9bdca24b5e393f008ad4f052a2085085744186e34d5150b5b519a2e9d7663219eef5e5cf64f66493fba5e579a07e", @ANYRESHEX, @ANYBLOB=',ro000000000000000010000,usr_id=\x00@\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC, @ANYBLOB="2c67726f757036a7aeaab788765f69643d09e8af42572ee4da90cc24e3b7c33e23333d48d0a2ae02f75bba4b43c859cf76e963547629164f241bd21f032ce060447949ad052371ad54cff9293f997b262e5ab3af48aaa20dceb0267f4dbecbc30740f99fba6200ef0d858bbe0d8d89799b8c8bb6f931c7204e", @ANYRESDEC=r10, @ANYBLOB="2c6d61785f726561643d3007000000300230303030303030346331392c626c6b736980653d3078303030303051303030303030303630302c646f6e745f6d6561737572652c7569643e", @ANYRESDEC=0xee00, @ANYBLOB="2ca3d526c246b71b73723d7b6261630000000072616e736d7574753d2f6465762f6b766d002c00ae3ad4bce20971cc0567d813ecfd861a6120e4dab49e2f919dd8aa9aef019450a3b04f977ee65f01000000f061bf91999b942e04792d53cc636019e31925132a5ccab623b1cb6347369444bc39a00634820a70faa90697774515ddbfe72bcd34488b253bee7101ca59d6fb269f597cf6eeb09a10c4c41e85f2ba912153b80dac76c5b5eef800000000"]) setgid(r10) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x4, &(0x7f0000000600)) stat(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r2, &(0x7f0000000140)='./bus\x00', r9, r11, 0x800) r12 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r12) 04:24:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1a000000}}, 0x40) 04:24:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x1300}, 0x0) [ 1474.137013] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000040)={0x0, 0x484e, 0x1, 0xfffffc00, 0x2, [0x7, 0x2bfccac, 0x5, 0x5], [0xe5b2, 0x3ff, 0x3, 0x9], [0x1, 0x0, 0x9, 0x7], [0x1, 0x30, 0x0, 0x800]}) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="7000000000011905030100000800000002000000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 1474.253702] audit: type=1400 audit(1584764675.412:154): avc: denied { map } for pid=3386 comm="syz-executor.0" path="/root/syzkaller-testdir305200471/syzkaller.bwUfoC/2304/bus" dev="sda1" ino=16625 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 1474.436159] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1474.484260] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:35 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x190) 04:24:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1b000000}}, 0x40) 04:24:35 executing program 3: syz_read_part_table(0xf6ffffff, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x1400}, 0x0) 04:24:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x50}, 0x4000) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) ioctl$VIDIOC_G_TUNER(r2, 0xc054561d, &(0x7f0000000040)={0x5, "9525bd7d5d48b52d508c52164f1ec0d5b560094c65f05aa497743165d224f960", 0x1, 0x102, 0xfffffff8, 0x401, 0x1, 0x4, 0xffffff80, 0x80}) socket$inet6(0xa, 0x800, 0x9) 04:24:35 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x2, 0x4) syz_emit_ethernet(0x32, &(0x7f0000000080)={@local, @dev, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @multicast1}, {0x0, 0x4e22, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r3, 0x113, 0x1, &(0x7f0000000040), 0x0) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0)='NLBL_MGMT\x00') ioctl$TIOCSERGETLSR(r1, 0x5459, &(0x7f0000000280)) sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYRES16=r4, @ANYBLOB='\x00'], 0x2}, 0x1, 0x0, 0x0, 0xd0}, 0x0) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$MON_IOCX_MFETCH(r5, 0xc0109207, &(0x7f00000003c0)={&(0x7f00000002c0)=[0x0, 0x0], 0x2, 0x401}) sendmsg$NLBL_MGMT_C_LISTALL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x30, r4, 0x100, 0x70bd27, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast1}]}, 0x30}}, 0x0) sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000080), 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x54, r4, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @empty}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @dev={0xfe, 0x80, [], 0x21}}, @NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0xa}]}, 0x54}}, 0x0) sendmsg$NLBL_MGMT_C_LISTALL(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, r4, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast1}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @ipv4={[], [], @remote}}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x20008041}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f00000000c0)={0x74, 0x0, [0x3, 0xffffffff00000000, 0xffffffffffffa619, 0x3]}) ioctl$IMCTRLREQ(r3, 0x80044945, &(0x7f0000000240)={0x4102, 0x6, 0x200, 0x2}) 04:24:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x1500}, 0x0) 04:24:36 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x3e000000}}, 0x40) 04:24:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r4, 0xc0045002, &(0x7f0000000040)=0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:24:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x1600}, 0x0) 04:24:36 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x4f000000}}, 0x40) [ 1475.028403] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:36 executing program 3: syz_read_part_table(0xf80f0000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:36 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x191) 04:24:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r3, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r4, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) sendto(r3, &(0x7f0000000100)="79fd7e0909eee4c7e97182e144b25ff540711596a223276d792a3e8f45b62b6817e55239aba4b8e39e45d404c973e6ac458d3c9c2964abeb355291418f13ad3a2ab4701e6b41c9a387cae48b3d71b584b5ad44f5b879ab5f6ea54b8d4c74f62291f4f252506da14fb2f001d8df091cba681ed03725de4696cb19c20257d66696c0cd5303822614dd8d27ed28874551914351527fc39d634465656705cfe0c00a76e0301bbb375e256e85a95c2f72", 0xae, 0x40000, &(0x7f0000000500)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e24, @remote}, 0x1, 0x1, 0x0, 0x1}}, 0x80) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x830141, 0x0) setsockopt$RDS_CONG_MONITOR(r6, 0x114, 0x6, &(0x7f00000000c0), 0x4) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:24:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x1700}, 0x0) 04:24:36 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x7f000000}}, 0x40) 04:24:36 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x5}, 0x0, 0x2, 0x9c0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/adsp1\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) r2 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r2, 0x113, 0x1, &(0x7f0000000040), 0x0) r3 = socket$inet6(0xa, 0x80801, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x3d, 0x0, &(0x7f00000004c0)) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000100), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x1, 0x5}, 0x4) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) timer_delete(r1) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500faff000000008aa1210b29017b83c8e96e6405f7e93dba4d64b5030b3388b0409a814343f1ae345b74efa745a12f5c0685e5261482e31e0cacc902c97e6145201b062261ef48004d26342c94f56a39359ba56724e4535d80ffbd6848d53382c262869ba15d8f0c2211a2b975eb4a9d08501c56ab5aa00000c5d197e50ff28b4a3b05489d1d127f5cb89d79b0871dd61783eefe87ff070000000000008cca1a363b2b28add653"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffcf8}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r5, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a40)={r6}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r4, 0x0, 0x8, &(0x7f00000001c0)='^ppp0lo\x00', r6}, 0x30) read$dsp(r0, &(0x7f00000003c0)=""/232, 0xe8) 04:24:36 executing program 3: syz_read_part_table(0xfcfdffff, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x1800}, 0x0) 04:24:36 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x80ffffff}}, 0x40) 04:24:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x1900}, 0x0) 04:24:37 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x9b000000}}, 0x40) 04:24:37 executing program 3: syz_read_part_table(0xfdfdffff, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:37 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffff80}}, 0x40) 04:24:37 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x192) 04:24:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x1a00}, 0x0) 04:24:37 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 04:24:37 executing program 3: syz_read_part_table(0xff0f0000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:37 executing program 0: syz_read_part_table(0xf80f0000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x1b00}, 0x0) 04:24:37 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x2}}, 0x40) 04:24:38 executing program 0: syz_read_part_table(0xf80f0000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x1c00}, 0x0) 04:24:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x7}}, 0x40) 04:24:38 executing program 3: syz_read_part_table(0xffffaa55, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x1d00}, 0x0) 04:24:38 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x193) 04:24:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x8}}, 0x40) 04:24:38 executing program 0: syz_read_part_table(0xf80f0000, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x1e00}, 0x0) 04:24:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f00000002c0)={0x1, 'veth1_to_hsr\x00', {}, 0xff81}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg(r4, &(0x7f0000000600)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}, {{&(0x7f0000000180)=@x25={0x9, @remote={[], 0x0}}, 0x80, 0x0}}], 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r7, 0x10e, 0x4, &(0x7f00000001c0)=0x10000, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {r9, 0x0, "9681b8", "714edcab09f6dc8c5a399f131daa1d6dab27b0f7e1181a130cd415a4f143f77d5c42558f638e5f3baec428ac75b06e6960c1a754332eb407b58c40a2bb96b7112cb0fc95d07aedb010a724cf278ef79aea12e0bb4e41605a17165cb37ca943b53ca57c8b8ca4656025498989d2bc3cb7c92ac6aead7392deff6a5b476212a7c47d8e145ac750615d9be1edf853009793d6f580efa93462879a8ccfa24d326cfee2ed2b915114ef12d66a1de795ac29c7a228242087bd675bd2c3105ef14b6a4021156c7ecdee4f1b59b54691857d62726891c5e0fd499fb39014f13019517168057cd2eb72ceed858abc039132b6c1638a8bcb1bfe64d9adfe30558f1d600729"}}, 0x110) write$RDMA_USER_CM_CMD_JOIN_MCAST(r8, &(0x7f0000000380)={0x16, 0x98, 0xfa00, {&(0x7f0000000240), 0x1, r9, 0x1c, 0x0, @in={0x2, 0x4e24, @rand_addr=0x4fd}}}, 0xa0) 04:24:38 executing program 3: syz_read_part_table(0xffffab56, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x9}}, 0x40) 04:24:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x1f00}, 0x0) 04:24:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x2000}, 0x0) 04:24:38 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvfrom$inet6(r2, &(0x7f0000000340)=""/216, 0xd8, 0x1, &(0x7f0000000040)={0xa, 0x4e23, 0x4, @remote, 0x397}, 0x1c) sendmmsg$inet_sctp(r0, &(0x7f0000001100)=[{&(0x7f00000001c0)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000000)=[{&(0x7f0000000200)="10", 0x1}, {&(0x7f00000000c0)="9643ef523512af7ff942b61945b17ef881e34ed7607fb18038aa50403c7ae495bd7c7924a5e6d4a2de41afde9c54017f97e900923b2f1f1afdf2db8cbbc4ce0cfb05539a5a3a960d66b54e4570d9d6cd33c5d26748486cc826dfc2f6cd1e505ad8de29399263d797da5147e36726e967df5dbb1c8448199ea3ccadc86f924a3f1e5d9d79f1d95c4eff79503ea49d089e1d9c797e", 0x94}, {&(0x7f0000000240)="5d7ad043ac8130ca1509040b0e8f0e78ba39b1d1bf88a8a5c813aea109e8734021c06de52f3018c0438a337ec349e1fefe0c6ff62af3d4c2ce25b4ad38b9d0c614f66c248080a253260ca90430ca1c73c9cbdbcf1a58969a2012d00e9878ea287a3e4e81bbda068c81ba28d351d9a8b956d7d2e615bdcff06c76969b98069f52884a4d549f5eeb5d08310136ae02acc048680e6cedf83a2559ebbbb69bf344bac5437e57a4f5bec44a1d35ee0622ce2a734594ef9ef9254f41b97c0d712b57ca72928b5c4030", 0xc6}], 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="001a00000000007e", @ANYRES32=0x0], 0xc}], 0x1, 0x0) 04:24:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0xa}}, 0x40) 04:24:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x2100}, 0x0) 04:24:39 executing program 3: syz_read_part_table(0xffffdabe, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:39 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0xc}}, 0x40) 04:24:39 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000000)) sendmsg(r2, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) recvmmsg(r2, &(0x7f0000000100)=[{{0x0, 0x2000, &(0x7f0000000440)=[{&(0x7f00000015c0)=""/4096, 0x19d98}], 0x1}}], 0xffffff1f, 0x0, 0x0) 04:24:39 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x194) 04:24:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r3, 0x113, 0x1, &(0x7f0000000040), 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r6}]}}}]}, 0x4c}}, 0x0) connect$packet(r3, &(0x7f0000000040)={0x11, 0x17, r6, 0x1, 0x3f, 0x6, @dev={[], 0x1c}}, 0x14) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r7, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:24:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x2200}, 0x0) 04:24:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x2300}, 0x0) 04:24:39 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0xd}}, 0x40) [ 1478.605540] batman_adv: Cannot find parent device [ 1478.641622] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:24:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x2400}, 0x0) 04:24:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:24:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r1, 0x5412, &(0x7f0000000000)=0x11) r2 = socket$inet6(0xa, 0x800, 0x5) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x3d, 0x0, &(0x7f00000004c0)) getsockopt$inet6_dccp_int(r2, 0x21, 0x10, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r4, 0x113, 0x1, &(0x7f0000000040), 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x3, 0x2, [0x9, 0x7]}, 0xc) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x8, 0x1, 0x7f, 0xff, 0xffffffff}, 0x14) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r4, 0x114, 0xa, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r6, 0x113, 0x1, &(0x7f0000000040), 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r6, 0x111, 0x5, 0x1, 0x4) ioctl$TIOCNOTTY(r5, 0x5422) 04:24:39 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0xe}}, 0x40) 04:24:40 executing program 3: syz_read_part_table(0xfffffdfc, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x2500}, 0x0) 04:24:40 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0xf}}, 0x40) 04:24:40 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0xffbffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="eb3c906d6b66732e6661740004", 0xd}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="64942f239f77f4db8f0ec0419d"]) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000040), 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0xd, 0x0, &(0x7f0000000000)=0xffffffffffffffba) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)={r1}) 04:24:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x2600}, 0x0) 04:24:40 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x18}}, 0x40) 04:24:40 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x195) 04:24:40 executing program 3: syz_read_part_table(0xfffffdfd, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x2700}, 0x0) 04:24:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="70000000000119050301000008000000f0ff0000240001001400010008000100fffffff708000200ac1e54010c0002000500010000000000240002000c00020005000100000000001400010008000100e0002002080002000000000008000700000000000c000600080003007f0000015241d9928a467201c20b3acaebcf3e6df10de3e41b317636dc46e459800000d4ce77c76e72fc1ddf1e3f000000000000000000000000000000be090248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d741824051a6be4f9e367aadd861caf92bd7a0907771b9666d5e7891e1c46eb9176438ae530e522064745951613166cfcd8bf4366c0a7fdd6a4ca4e70960413d2d7a3178bdce644569afb0a861f6ca118a65c8fbb64bc79bfd662479747f389edc0f3714f4a5f3e2644e8211b43b8b5af676ebc6b6e70f6de1a685a6af8c1d217cbe8b1815ca620dba91fdb9ea22c0225ecea778c8b97f1ac56c0d058387c0f86b7136c3a88b2b2b9be4e8278835b0cef8c50f0c2f2ea4d775e9aa518a3a76dd3cc02b294058e655fb1a863d76473247fce37144c70400000000000000d6c26ec8f8419dd81a7f7abc519d7adeb89aa29aaa6eb0af56f4b0250a8f7a005a47961769424cc042444c54761cd6845b3c136fd4f57f652adc6e18b440293a338150b50ae877edfdb51424cec1ef014cf3b16691c24ab1dfcc95d802fc2da1952c87cf8c38b731045ddefaa6b8cbf4a6b629bc23f99d80a7936b771cd159f4998d"], 0x70}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1304d282ea3a2db3}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x78, 0x4, 0xa, 0x3, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFTA_CHAIN_COUNTERS={0x58, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x9}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x5}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x2000000}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x52c}]}, @NFTA_CHAIN_TYPE={0xa, 0x7, 'route\x00'}]}, 0x78}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) 04:24:40 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x1a}}, 0x40) 04:24:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)="24000000180007841dfffd946f61050002008100fd038b0530000800080009000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}, {&(0x7f0000000100)="090b78ed7494ccdcaad4fbb72063388adfe055432745e5ae0485f9c1080533d8b2d9b61e1c403d593b2807fd08d6a145d625cced78279f4a53a453f1ddd46291403076c112c7822479acbc835a246859ec8f9c14be75c1884707144ef17f4b69a1f1e43871e1c2cf118c8d1d16c83f68917bd3bd3d405a402fcde6533f83bb9a0b68ef7088d25178cb40f2b0e05f", 0x8e}], 0x2a}, 0x40095) 04:24:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x2800}, 0x0) 04:24:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x401, 0x400000008a}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x8000001, 0x0, 0x3, 0x0, 0x81, 0x0, 0x0, 0x8}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000140)) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) mkdir(0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) pipe2$9p(0x0, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x73) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) 04:24:40 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x1b}}, 0x40) 04:24:40 executing program 3: syz_read_part_table(0xffffff7f, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0x400000003}]) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @broadcast}}}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f0000000040), 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:24:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x2900}, 0x0) [ 1479.748910] kasan: CONFIG_KASAN_INLINE enabled [ 1479.753920] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1479.791342] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1479.797636] CPU: 1 PID: 3814 Comm: syz-executor.2 Not tainted 4.19.112-syzkaller #0 [ 1479.805436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1479.814885] RIP: 0010:get_unique_tuple+0x27a/0x1d50 [ 1479.819919] Code: c1 e9 03 80 3c 11 00 0f 85 cd 17 00 00 4a 8b 14 e5 60 10 8e 89 4c 8d 24 c2 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 <80> 3c 02 00 0f 85 99 17 00 00 49 8b 04 24 48 89 85 08 ff ff ff e8 [ 1479.838830] RSP: 0018:ffff8880a0266e18 EFLAGS: 00010246 [ 1479.844203] RAX: dffffc0000000000 RBX: ffff8880a0266fc0 RCX: 1ffffffff131c2fc [ 1479.851565] RDX: 0000000000000000 RSI: ffffffff85d1f757 RDI: ffffffff898e17e0 [ 1479.858836] RBP: ffff8880a0266f70 R08: ffff88804a24a480 R09: ffffed1015ce4733 [ 1479.866109] R10: ffffed1015ce4732 R11: ffff8880ae723993 R12: 0000000000000000 [ 1479.873386] R13: 0000000000000001 R14: ffff8880a0267010 R15: ffff888081c6f000 [ 1479.880661] FS: 00007fc701f93700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 1479.888892] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1479.894774] CR2: 0000000020000480 CR3: 0000000089f0c000 CR4: 00000000001426e0 [ 1479.902052] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1479.909331] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1479.916603] Call Trace: [ 1479.919199] ? find_held_lock+0x2d/0x110 [ 1479.923271] ? nf_ct_invert_tuplepr+0x118/0x1f0 [ 1479.927949] ? hash_by_src+0x3a0/0x3a0 [ 1479.931840] ? lock_downgrade+0x740/0x740 [ 1479.936000] ? check_preemption_disabled+0x41/0x280 [ 1479.941053] nf_nat_setup_info+0x1c3/0x840 [ 1479.945302] ? nf_nat_proto_clean+0x1f0/0x1f0 [ 1479.949812] ? save_stack+0x89/0xa0 [ 1479.953608] ? kasan_kmalloc+0xbf/0xe0 [ 1479.957502] ? kmem_cache_alloc+0x127/0x710 [ 1479.961834] ? __nf_conntrack_alloc+0xd6/0x670 [ 1479.966427] ? ctnetlink_create_conntrack+0xb1/0x1280 [ 1479.972150] ? ctnetlink_new_conntrack+0x4f5/0xde0 [ 1479.977088] ? nfnetlink_rcv_msg+0xc9e/0xf4b [ 1479.981499] ? netlink_rcv_skb+0x160/0x410 [ 1479.985736] ? nfnetlink_rcv+0x1b2/0x420 [ 1479.989802] ? netlink_unicast+0x4d7/0x6a0 [ 1479.994074] ? netlink_sendmsg+0x80b/0xcd0 [ 1479.998310] ? sock_sendmsg+0xcf/0x120 [ 1480.002196] ? ___sys_sendmsg+0x803/0x920 [ 1480.006351] ? __sys_sendmsg+0xec/0x1b0 [ 1480.010331] ? do_syscall_64+0xf9/0x620 [ 1480.014310] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1480.019685] __nf_nat_alloc_null_binding+0x164/0x1d0 [ 1480.024794] ? nf_nat_setup_info+0x840/0x840 [ 1480.029210] ? mark_held_locks+0xf0/0xf0 [ 1480.033280] ? __lock_is_held+0xad/0x140 [ 1480.037351] nfnetlink_parse_nat_setup+0x38f/0x410 [ 1480.042291] ? nf_nat_inet_fn+0x8c0/0x8c0 [ 1480.046462] ? __nf_conntrack_alloc+0xd6/0x670 [ 1480.051087] ? __lock_is_held+0xad/0x140 [ 1480.055168] ctnetlink_parse_nat_setup+0xb6/0x640 [ 1480.060034] ctnetlink_create_conntrack+0x4b7/0x1280 [ 1480.065160] ? ctnetlink_dump_table+0x11e0/0x11e0 [ 1480.070012] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1480.075211] ? hash_conntrack_raw+0x2d3/0x450 [ 1480.079715] ? nf_ct_unconfirmed_destroy+0xa0/0xa0 [ 1480.084660] ? __nf_conntrack_confirm+0x2fc0/0x2fc0 [ 1480.089686] ctnetlink_new_conntrack+0x4f5/0xde0 [ 1480.094451] ? ctnetlink_create_conntrack+0x1280/0x1280 [ 1480.099822] ? mutex_trylock+0x1a0/0x1a0 [ 1480.103893] ? __lock_is_held+0xad/0x140 [ 1480.107960] ? check_preemption_disabled+0x41/0x280 [ 1480.113002] ? ctnetlink_create_conntrack+0x1280/0x1280 [ 1480.118387] nfnetlink_rcv_msg+0xc9e/0xf4b [ 1480.122654] ? nfnetlink_bind+0x2b0/0x2b0 [ 1480.126916] ? __local_bh_enable_ip+0x159/0x270 [ 1480.131717] ? cred_has_capability+0x162/0x2e0 [ 1480.136315] ? cred_has_capability+0x16d/0x2e0 [ 1480.140913] ? selinux_ipv4_output+0x50/0x50 [ 1480.145332] ? selinux_ipv4_output+0x50/0x50 [ 1480.149752] netlink_rcv_skb+0x160/0x410 [ 1480.153834] ? nfnetlink_bind+0x2b0/0x2b0 [ 1480.157990] ? netlink_ack+0xa60/0xa60 [ 1480.161889] ? ns_capable_common+0xe2/0x100 [ 1480.166219] nfnetlink_rcv+0x1b2/0x420 [ 1480.170117] ? nfnetlink_rcv_batch+0x15e0/0x15e0 [ 1480.174881] netlink_unicast+0x4d7/0x6a0 [ 1480.178951] ? netlink_attachskb+0x710/0x710 [ 1480.183373] netlink_sendmsg+0x80b/0xcd0 [ 1480.187446] ? netlink_unicast+0x6a0/0x6a0 [ 1480.191685] ? move_addr_to_kernel.part.0+0x110/0x110 [ 1480.196883] ? netlink_unicast+0x6a0/0x6a0 [ 1480.201119] sock_sendmsg+0xcf/0x120 [ 1480.204843] ___sys_sendmsg+0x803/0x920 [ 1480.208825] ? copy_msghdr_from_user+0x410/0x410 [ 1480.213587] ? __fget+0x319/0x510 [ 1480.217051] ? __fget+0x340/0x510 [ 1480.220505] ? iterate_fd+0x350/0x350 [ 1480.224316] ? __fget_light+0x1d1/0x230 [ 1480.228313] __sys_sendmsg+0xec/0x1b0 [ 1480.232155] ? __ia32_sys_shutdown+0x70/0x70 [ 1480.236587] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1480.241349] ? trace_hardirqs_off_caller+0x55/0x210 [ 1480.246383] ? do_syscall_64+0x21/0x620 [ 1480.250637] do_syscall_64+0xf9/0x620 [ 1480.254451] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1480.259646] RIP: 0033:0x45c849 [ 1480.262844] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1480.281748] RSP: 002b:00007fc701f92c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 04:24:41 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x6fcb}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xe39719c}], 0x1, 0x196) 04:24:41 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x3e}}, 0x40) [ 1480.289478] RAX: ffffffffffffffda RBX: 00007fc701f936d4 RCX: 000000000045c849 [ 1480.296752] RDX: 0000000000000000 RSI: 0000000020000640 RDI: 0000000000000005 [ 1480.304030] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1480.311299] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1480.318573] R13: 0000000000000958 R14: 00000000004cc0bf R15: 000000000076bf0c [ 1480.325853] Modules linked in: 04:24:41 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x2a00}, 0x0) 04:24:41 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xb, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @empty}}}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}, 0x2b00}, 0x0) [ 1480.373864] ---[ end trace a3525e7bd1d8f610 ]--- [ 1480.389388] RIP: 0010:get_unique_tuple+0x27a/0x1d50 [ 1480.420005] Code: c1 e9 03 80 3c 11 00 0f 85 cd 17 00 00 4a 8b 14 e5 60 10 8e 89 4c 8d 24 c2 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 <80> 3c 02 00 0f 85 99 17 00 00 49 8b 04 24 48 89 85 08 ff ff ff e8 [ 1480.455656] RSP: 0018:ffff8880a0266e18 EFLAGS: 00010246 [ 1480.455669] RAX: dffffc0000000000 RBX: ffff8880a0266fc0 RCX: 1ffffffff131c2fc [ 1480.455676] RDX: 0000000000000000 RSI: ffffffff85d1f757 RDI: ffffffff898e17e0 [ 1480.455684] RBP: ffff8880a0266f70 R08: ffff88804a24a480 R09: ffffed1015ce4733 [ 1480.455691] R10: ffffed1015ce4732 R11: ffff8880ae723993 R12: 0000000000000000 [ 1480.455698] R13: 0000000000000001 R14: ffff8880a0267010 R15: ffff888081c6f000 [ 1480.455708] FS: 00007fc701f93700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 1480.455716] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1480.455723] CR2: 00007fffc404fb1c CR3: 0000000089f0c000 CR4: 00000000001406e0 [ 1480.455734] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1480.455741] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1480.455748] Kernel panic - not syncing: Fatal exception [ 1480.457132] Kernel Offset: disabled [ 1480.543614] Rebooting in 86400 seconds..