0x4}, 0x10) 05:51:52 executing program 5: 05:51:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:51:52 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x4}]}, 0x18}}, 0x0) 05:51:52 executing program 5: 05:51:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x100000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:51:52 executing program 5: 05:51:53 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0xd800}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:51:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:51:53 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x4}]}, 0x18}}, 0x0) 05:51:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0x0, 0x4}, 0x10) 05:51:53 executing program 5: 05:51:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x9000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:51:53 executing program 5: 05:51:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:51:53 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x4}]}, 0x18}}, 0x0) 05:51:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0x0, 0x4}, 0x10) 05:51:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x6800}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:51:53 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={"6c6f0000000000000000000100", &(0x7f0000000080)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "189f61"}}) 05:51:54 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x58}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:51:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:51:54 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x4, 0x0, [@generic]}]}, 0x18}}, 0x0) 05:51:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x16}]}, 0x8) 05:51:54 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:51:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda}, 0x10) 05:51:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:51:54 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x4, 0x0, [@generic]}]}, 0x18}}, 0x0) 05:51:54 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2400000004061f001cfffd946fa2830020200a001000010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 05:51:54 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x8}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:51:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:51:54 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000001100)='/dev/adsp#\x00', 0x6, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000001140)={{0x0, 0xffffffffc3967f5d}, {0xfffffffffffffc01, 0x80}, 0x0, 0x2, 0x7ff}) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80201, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x40, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001400)={'raw\x00', 0xc4, "195056b5bf844c5e7c34a634303df45895f1f6e93024d41437b50c517b196fe1ca3e4dfb10f5cdfe9dfaf3c5188f716975067efbd44413a1f64208352f247ac28357941163da6263ada1847179c0aee3bb4035f300aefeb59be03e188f66ca2099bbae34547b43fd4b7e35ab7cc98ac1e4762951d75efaac85299103b9de0db4c1b5e308cd77b203064206e54b6385e552427a41890470a024cd2448780e6d43ece4f0ee94527e8eb0ee5785439dc43c3e7bd54a42f62d685f94375115aa06a7fd9b4775"}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000001280), &(0x7f00000013c0)=0x4) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x0, &(0x7f00000002c0)={@local, @dev}, &(0x7f0000000340)=0xc) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x4, 0xa00) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000009061f001cfffd940aa2830020200a000900010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f00000012c0)={0x0, 0x0, 0x0, 'queue0\x00', 0xfff}) semget$private(0x0, 0x20, 0x402) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0xde, 0x3) r4 = creat(&(0x7f0000000240)='./file0\x00', 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000300)={0x15, 0x992, &(0x7f00000003c0)="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"}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x20) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)="6e667300eff16117129ed0598aa8d4", 0xc202, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r3, 0xc1205531, &(0x7f0000000fc0)={0x81, 0x6, 0x4, 0x8, [], [], [], 0x7, 0x5, 0x9, 0x101, "bf342c7a604e8de6218216cff87bcf52"}) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000f80), 0xffffffffffffffff) getpgrp(0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) [ 2148.298509] netlink: 'syz-executor5': attribute type 1 has an invalid length. 05:51:55 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x128cdf3ec32}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:51:55 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x18, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x4, 0x0, [@generic]}]}, 0x18}}, 0x0) 05:51:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:51:55 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:51:55 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000001100)='/dev/adsp#\x00', 0x6, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000001140)={{0x0, 0xffffffffc3967f5d}, {0xfffffffffffffc01, 0x80}, 0x0, 0x2, 0x7ff}) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80201, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x40, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001400)={'raw\x00', 0xc4, "195056b5bf844c5e7c34a634303df45895f1f6e93024d41437b50c517b196fe1ca3e4dfb10f5cdfe9dfaf3c5188f716975067efbd44413a1f64208352f247ac28357941163da6263ada1847179c0aee3bb4035f300aefeb59be03e188f66ca2099bbae34547b43fd4b7e35ab7cc98ac1e4762951d75efaac85299103b9de0db4c1b5e308cd77b203064206e54b6385e552427a41890470a024cd2448780e6d43ece4f0ee94527e8eb0ee5785439dc43c3e7bd54a42f62d685f94375115aa06a7fd9b4775"}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000001280), &(0x7f00000013c0)=0x4) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x0, &(0x7f00000002c0)={@local, @dev}, &(0x7f0000000340)=0xc) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x4, 0xa00) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000009061f001cfffd940aa2830020200a000900010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f00000012c0)={0x0, 0x0, 0x0, 'queue0\x00', 0xfff}) semget$private(0x0, 0x20, 0x402) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0xde, 0x3) r4 = creat(&(0x7f0000000240)='./file0\x00', 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000300)={0x15, 0x992, &(0x7f00000003c0)="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"}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x20) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)="6e667300eff16117129ed0598aa8d4", 0xc202, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r3, 0xc1205531, &(0x7f0000000fc0)={0x81, 0x6, 0x4, 0x8, [], [], [], 0x7, 0x5, 0x9, 0x101, "bf342c7a604e8de6218216cff87bcf52"}) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000f80), 0xffffffffffffffff) getpgrp(0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) 05:51:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda}, 0x10) 05:51:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:51:55 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x2c, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x18, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0f"]}]}, 0x2c}}, 0x0) 05:51:55 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x74000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2149.357250] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. 05:51:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(0xffffffffffffffff) close(r1) 05:51:55 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x2c, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x18, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0f"]}]}, 0x2c}}, 0x0) [ 2149.562158] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. 05:51:55 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000001100)='/dev/adsp#\x00', 0x6, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000001140)={{0x0, 0xffffffffc3967f5d}, {0xfffffffffffffc01, 0x80}, 0x0, 0x2, 0x7ff}) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80201, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x40, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001400)={'raw\x00', 0xc4, "195056b5bf844c5e7c34a634303df45895f1f6e93024d41437b50c517b196fe1ca3e4dfb10f5cdfe9dfaf3c5188f716975067efbd44413a1f64208352f247ac28357941163da6263ada1847179c0aee3bb4035f300aefeb59be03e188f66ca2099bbae34547b43fd4b7e35ab7cc98ac1e4762951d75efaac85299103b9de0db4c1b5e308cd77b203064206e54b6385e552427a41890470a024cd2448780e6d43ece4f0ee94527e8eb0ee5785439dc43c3e7bd54a42f62d685f94375115aa06a7fd9b4775"}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000001280), &(0x7f00000013c0)=0x4) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x0, &(0x7f00000002c0)={@local, @dev}, &(0x7f0000000340)=0xc) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x4, 0xa00) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000009061f001cfffd940aa2830020200a000900010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f00000012c0)={0x0, 0x0, 0x0, 'queue0\x00', 0xfff}) semget$private(0x0, 0x20, 0x402) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0xde, 0x3) r4 = creat(&(0x7f0000000240)='./file0\x00', 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000300)={0x15, 0x992, &(0x7f00000003c0)="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"}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x20) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)="6e667300eff16117129ed0598aa8d4", 0xc202, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r3, 0xc1205531, &(0x7f0000000fc0)={0x81, 0x6, 0x4, 0x8, [], [], [], 0x7, 0x5, 0x9, 0x101, "bf342c7a604e8de6218216cff87bcf52"}) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000f80), 0xffffffffffffffff) getpgrp(0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) 05:51:56 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x8000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:51:56 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x2c, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x18, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0f"]}]}, 0x2c}}, 0x0) 05:51:56 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x6c000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:51:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) open_by_handle_at(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") sendfile(r1, r2, &(0x7f0000000180)=0xf0110, 0x100000001) 05:51:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(0xffffffffffffffff) close(r1) 05:51:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda}, 0x10) [ 2150.032749] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. 05:51:56 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x6}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:51:56 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:51:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(0xffffffffffffffff) close(r1) [ 2150.320933] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:51:56 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x1000000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:51:56 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x2c, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x18, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0f"]}]}, 0x2c}}, 0x0) 05:51:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(0xffffffffffffffff) [ 2150.526117] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. 05:51:56 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xffffff7f}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:51:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) open_by_handle_at(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") sendfile(r1, r2, &(0x7f0000000180)=0xf0110, 0x100000001) 05:51:56 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x2c, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x18, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0f"]}]}, 0x2c}}, 0x0) 05:51:56 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0xd606}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:51:56 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x9, 0x70000) pipe(&(0x7f0000bbc000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000140)={{0x9, 0x2}, 0x1, 0xfffffffffffff801, 0x40000000000000, {0x401, 0x9}, 0x6, 0xfff}) rt_sigprocmask(0x0, &(0x7f0000072ff8)={0x7fffffff}, &(0x7f00000000c0), 0x8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=ANY=[]) fcntl$setstatus(r0, 0x4, 0x2000) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r3, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) sendfile(r2, r3, &(0x7f00000002c0), 0x9) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000740)) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000180)={0x0, @aes256, 0x1, "a19babd1a8a19148"}) writev(r3, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) sendmsg(r3, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000580)=0x18) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000200)='htcp\x00', 0x5) sendto$inet(r3, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2, 0x0, @empty=0xe000000}, 0x6) dup2(r1, r0) io_setup(0x2, &(0x7f0000000100)=0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x3, &(0x7f00000005c0)=0x8000000000040, 0xffffffffffffff82) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x3, 0x4) io_submit(r5, 0x1, &(0x7f0000000400)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000040)='n', 0x1}]) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x78, r6, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x35e}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x10}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x2}}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x3bc6d0a49ed2cd65}, 0x4) [ 2150.985516] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. 05:51:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3f00}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:51:57 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x2c, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x18, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0f"]}]}, 0x2c}}, 0x0) [ 2151.248860] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. 05:51:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(0xffffffffffffffff) 05:51:57 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x30, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x1c, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab"]}]}, 0x30}}, 0x0) 05:51:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfbffffff00000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2151.716543] netlink: 12 bytes leftover after parsing attributes in process `syz-executor1'. 05:51:57 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x6c}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:51:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) open_by_handle_at(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") sendfile(r1, r2, &(0x7f0000000180)=0xf0110, 0x100000001) 05:51:58 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:51:58 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x30, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x1c, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab"]}]}, 0x30}}, 0x0) 05:51:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) [ 2152.089638] netlink: 12 bytes leftover after parsing attributes in process `syz-executor1'. 05:51:58 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x68000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:51:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) flistxattr(r0, &(0x7f0000000040)=""/11, 0xffffffcb) 05:51:58 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x30, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x1c, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab"]}]}, 0x30}}, 0x0) 05:51:58 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x48000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) [ 2152.332465] netlink: 12 bytes leftover after parsing attributes in process `syz-executor1'. 05:51:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(0xffffffffffffffff) 05:51:58 executing program 2 (fault-call:6 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:51:58 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x30, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x1c, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87ee"]}]}, 0x30}}, 0x0) [ 2152.561561] FAULT_INJECTION: forcing a failure. [ 2152.561561] name failslab, interval 1, probability 0, space 0, times 0 [ 2152.573838] CPU: 1 PID: 10563 Comm: syz-executor2 Not tainted 4.20.0-rc5-next-20181207+ #163 [ 2152.582445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2152.591803] Call Trace: [ 2152.594408] dump_stack+0x244/0x39d [ 2152.598059] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2152.603265] ? graph_lock+0x270/0x270 [ 2152.607078] ? perf_trace_sched_process_exec+0x860/0x860 [ 2152.612549] should_fail.cold.4+0xa/0x17 [ 2152.616625] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2152.621767] ? get_pid_task+0xd6/0x1a0 [ 2152.625689] ? find_held_lock+0x36/0x1c0 [ 2152.629790] ? find_held_lock+0x36/0x1c0 [ 2152.633920] ? perf_trace_sched_process_exec+0x860/0x860 [ 2152.639384] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 2152.644331] __should_failslab+0x124/0x180 [ 2152.648575] should_failslab+0x9/0x14 [ 2152.652421] kmem_cache_alloc+0x2c4/0x730 [ 2152.656577] ? __lock_is_held+0xb5/0x140 [ 2152.660663] getname_flags+0xd0/0x590 [ 2152.664499] user_path_at_empty+0x2d/0x50 [ 2152.668680] path_setxattr+0xd6/0x230 [ 2152.672495] ? setxattr+0x450/0x450 [ 2152.676140] ? trace_hardirqs_on+0xbd/0x310 [ 2152.680498] ? __ia32_sys_read+0xb0/0xb0 [ 2152.684575] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2152.689953] ? trace_hardirqs_off_caller+0x310/0x310 [ 2152.695074] __x64_sys_lsetxattr+0xc1/0x150 [ 2152.699438] do_syscall_64+0x1b9/0x820 [ 2152.703339] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2152.708720] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2152.713673] ? trace_hardirqs_on_caller+0x310/0x310 [ 2152.718747] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2152.723775] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 2152.730510] ? __switch_to_asm+0x40/0x70 [ 2152.734583] ? __switch_to_asm+0x34/0x70 [ 2152.738674] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2152.743536] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2152.748759] RIP: 0033:0x457659 [ 2152.751969] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2152.770886] RSP: 002b:00007f1572ba0c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 2152.778604] RAX: ffffffffffffffda RBX: 00007f1572ba0c90 RCX: 0000000000457659 [ 2152.785949] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000140 [ 2152.793269] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2152.800550] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1572ba16d4 [ 2152.807827] R13: 00000000004c9f28 R14: 00000000004d45d0 R15: 0000000000000004 05:51:58 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x68}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:51:58 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x2c010000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:51:58 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x30, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x1c, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87ee"]}]}, 0x30}}, 0x0) 05:51:59 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x30, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x1c, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87ee"]}]}, 0x30}}, 0x0) 05:51:59 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:51:59 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x30, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x1c, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb3"]}]}, 0x30}}, 0x0) 05:51:59 executing program 5 (fault-call:9 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:51:59 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:51:59 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x30, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x1c, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb3"]}]}, 0x30}}, 0x0) 05:51:59 executing program 2 (fault-call:6 fault-nth:1): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:51:59 executing program 0 (fault-call:8 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:51:59 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4c00}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:51:59 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x30, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x1c, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb3"]}]}, 0x30}}, 0x0) [ 2153.485828] FAULT_INJECTION: forcing a failure. [ 2153.485828] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2153.497716] CPU: 1 PID: 10603 Comm: syz-executor2 Not tainted 4.20.0-rc5-next-20181207+ #163 [ 2153.506320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2153.515683] Call Trace: [ 2153.518297] dump_stack+0x244/0x39d [ 2153.521948] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2153.527171] ? mark_held_locks+0x130/0x130 [ 2153.531436] should_fail.cold.4+0xa/0x17 [ 2153.535514] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2153.540627] ? graph_lock+0x270/0x270 [ 2153.544455] ? graph_lock+0x270/0x270 [ 2153.548281] ? mark_held_locks+0x130/0x130 [ 2153.552528] ? find_held_lock+0x36/0x1c0 [ 2153.556619] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2153.562185] ? _parse_integer+0x134/0x180 [ 2153.566345] ? graph_lock+0x270/0x270 [ 2153.570195] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2153.575755] ? _kstrtoull+0x188/0x250 [ 2153.579582] ? _parse_integer+0x180/0x180 [ 2153.583752] ? graph_lock+0x270/0x270 [ 2153.587567] ? lock_release+0xa00/0xa00 [ 2153.591555] ? perf_trace_sched_process_exec+0x860/0x860 [ 2153.597018] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2153.602634] ? should_fail+0x22d/0xd01 [ 2153.606570] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2153.611698] __alloc_pages_nodemask+0x366/0xec0 [ 2153.616421] ? __alloc_pages_slowpath+0x2e00/0x2e00 [ 2153.621484] ? find_held_lock+0x36/0x1c0 [ 2153.625582] ? find_held_lock+0x36/0x1c0 [ 2153.629684] ? trace_hardirqs_off+0xb8/0x310 [ 2153.634110] cache_grow_begin+0xa5/0x8c0 [ 2153.638196] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2153.643748] ? check_preemption_disabled+0x48/0x280 [ 2153.648783] kmem_cache_alloc+0x66a/0x730 [ 2153.652938] ? __lock_is_held+0xb5/0x140 [ 2153.657036] getname_flags+0xd0/0x590 [ 2153.660849] user_path_at_empty+0x2d/0x50 [ 2153.665024] path_setxattr+0xd6/0x230 [ 2153.668842] ? setxattr+0x450/0x450 [ 2153.672481] ? trace_hardirqs_on+0xbd/0x310 [ 2153.676810] ? __ia32_sys_read+0xb0/0xb0 [ 2153.680894] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2153.686287] ? trace_hardirqs_off_caller+0x310/0x310 [ 2153.691406] __x64_sys_lsetxattr+0xc1/0x150 [ 2153.695744] do_syscall_64+0x1b9/0x820 [ 2153.699675] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2153.705054] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2153.710020] ? trace_hardirqs_on_caller+0x310/0x310 [ 2153.715049] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2153.720091] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 2153.726777] ? __switch_to_asm+0x40/0x70 [ 2153.730850] ? __switch_to_asm+0x34/0x70 [ 2153.734931] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2153.739797] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2153.744996] RIP: 0033:0x457659 [ 2153.748200] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2153.767114] RSP: 002b:00007f1572ba0c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 2153.774856] RAX: ffffffffffffffda RBX: 00007f1572ba0c90 RCX: 0000000000457659 [ 2153.782154] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000140 [ 2153.789431] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2153.796710] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1572ba16d4 [ 2153.803984] R13: 00000000004c9f28 R14: 00000000004d45d0 R15: 0000000000000004 05:51:59 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x6c00}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:51:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:51:59 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:00 executing program 1 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2153.955017] FAULT_INJECTION: forcing a failure. [ 2153.955017] name failslab, interval 1, probability 0, space 0, times 0 [ 2153.966536] CPU: 0 PID: 10615 Comm: syz-executor1 Not tainted 4.20.0-rc5-next-20181207+ #163 [ 2153.975180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2153.984585] Call Trace: [ 2153.987221] dump_stack+0x244/0x39d [ 2153.990914] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2153.996203] ? perf_trace_lock+0x4a7/0x7a0 [ 2154.000483] should_fail.cold.4+0xa/0x17 [ 2154.004578] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2154.009727] ? perf_trace_lock+0x4a7/0x7a0 [ 2154.014006] ? lock_is_held_type+0x210/0x210 [ 2154.018549] ? lock_is_held_type+0x210/0x210 [ 2154.023021] ? find_held_lock+0x36/0x1c0 [ 2154.027140] ? st_write+0x28c8/0x3230 [ 2154.031199] ? perf_trace_sched_process_exec+0x860/0x860 [ 2154.036693] __should_failslab+0x124/0x180 [ 2154.040997] should_failslab+0x9/0x14 [ 2154.044827] kmem_cache_alloc_node+0x273/0x730 [ 2154.049442] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2154.055023] ? check_preemption_disabled+0x48/0x280 [ 2154.060076] __alloc_skb+0x119/0x770 [ 2154.063838] ? netdev_alloc_frag+0x1f0/0x1f0 [ 2154.068276] ? __release_sock+0x3a0/0x3a0 [ 2154.072453] ? __local_bh_enable_ip+0x160/0x260 [ 2154.077177] ? netlink_insert+0xfe/0x240 [ 2154.081280] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2154.086841] ? netlink_autobind.isra.34+0x232/0x310 [ 2154.091911] netlink_sendmsg+0xb29/0xfc0 [ 2154.096053] ? netlink_unicast+0x760/0x760 [ 2154.100337] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 2154.105299] ? apparmor_socket_sendmsg+0x29/0x30 [ 2154.110082] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2154.115650] ? security_socket_sendmsg+0x94/0xc0 [ 2154.120430] ? netlink_unicast+0x760/0x760 [ 2154.124696] sock_sendmsg+0xd5/0x120 [ 2154.128448] ___sys_sendmsg+0x7fd/0x930 [ 2154.132460] ? copy_msghdr_from_user+0x580/0x580 [ 2154.137255] ? lock_downgrade+0x900/0x900 [ 2154.141435] ? proc_fail_nth_write+0x9e/0x210 [ 2154.146043] ? __fget_light+0x2e9/0x430 [ 2154.150064] ? fget_raw+0x20/0x20 [ 2154.153541] ? find_held_lock+0x36/0x1c0 [ 2154.158169] ? kasan_check_write+0x14/0x20 [ 2154.162436] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 2154.167407] ? wait_for_completion+0x8a0/0x8a0 [ 2154.172041] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2154.177605] ? sockfd_lookup_light+0xc5/0x160 [ 2154.182141] __sys_sendmsg+0x11d/0x280 [ 2154.186064] ? __ia32_sys_shutdown+0x80/0x80 [ 2154.190500] ? __sb_end_write+0xd9/0x110 [ 2154.194599] ? fput+0x130/0x1a0 [ 2154.197909] ? do_syscall_64+0x9a/0x820 [ 2154.201924] ? do_syscall_64+0x9a/0x820 [ 2154.205949] ? trace_hardirqs_off_caller+0x310/0x310 [ 2154.211096] __x64_sys_sendmsg+0x78/0xb0 [ 2154.215219] do_syscall_64+0x1b9/0x820 [ 2154.219136] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2154.224549] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2154.229500] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2154.234372] ? trace_hardirqs_on_caller+0x310/0x310 [ 2154.239413] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2154.244478] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2154.249543] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2154.254429] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2154.259672] RIP: 0033:0x457659 [ 2154.262889] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2154.281834] RSP: 002b:00007fb971b7ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2154.289733] RAX: ffffffffffffffda RBX: 00007fb971b7ec90 RCX: 0000000000457659 [ 2154.297032] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 2154.304321] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2154.311613] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb971b7f6d4 [ 2154.318902] R13: 00000000004c40d7 R14: 00000000004d67a8 R15: 0000000000000005 05:52:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x84, 0x40, 0x0, 0x0) close(r2) close(r1) 05:52:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:02 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:02 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x21c}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:02 executing program 1 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x2c, 0x0, 0x0) close(r2) close(r1) [ 2156.317890] FAULT_INJECTION: forcing a failure. [ 2156.317890] name failslab, interval 1, probability 0, space 0, times 0 [ 2156.364431] CPU: 0 PID: 10635 Comm: syz-executor1 Not tainted 4.20.0-rc5-next-20181207+ #163 [ 2156.373102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2156.382507] Call Trace: [ 2156.385175] dump_stack+0x244/0x39d [ 2156.388848] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2156.394088] ? debug_smp_processor_id+0x1c/0x20 [ 2156.398797] ? perf_trace_lock+0x14d/0x7a0 [ 2156.403074] should_fail.cold.4+0xa/0x17 [ 2156.407191] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2156.412325] ? __save_stack_trace+0x8d/0xf0 [ 2156.416710] ? save_stack+0xa9/0xd0 [ 2156.420374] ? save_stack+0x43/0xd0 [ 2156.424043] ? find_held_lock+0x36/0x1c0 [ 2156.428174] ? st_int_ioctl+0xcb8/0x4ad0 [ 2156.432292] ? st_int_ioctl+0xcb8/0x4ad0 [ 2156.436383] ? perf_trace_sched_process_exec+0x860/0x860 [ 2156.441886] ? check_preemption_disabled+0x48/0x280 [ 2156.446956] __should_failslab+0x124/0x180 [ 2156.451322] should_failslab+0x9/0x14 [ 2156.455185] kmem_cache_alloc_node_trace+0x277/0x740 [ 2156.460334] ? __alloc_skb+0x119/0x770 [ 2156.464279] __kmalloc_node_track_caller+0x3c/0x70 [ 2156.469255] __kmalloc_reserve.isra.38+0x41/0xe0 [ 2156.474067] __alloc_skb+0x155/0x770 [ 2156.477823] ? netdev_alloc_frag+0x1f0/0x1f0 [ 2156.482265] ? __release_sock+0x3a0/0x3a0 [ 2156.486447] ? __local_bh_enable_ip+0x160/0x260 [ 2156.491186] ? netlink_insert+0xfe/0x240 [ 2156.495287] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2156.500856] ? netlink_autobind.isra.34+0x232/0x310 [ 2156.505921] netlink_sendmsg+0xb29/0xfc0 [ 2156.510028] ? netlink_unicast+0x760/0x760 [ 2156.514290] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 2156.519260] ? apparmor_socket_sendmsg+0x29/0x30 [ 2156.524064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2156.529631] ? security_socket_sendmsg+0x94/0xc0 [ 2156.534415] ? netlink_unicast+0x760/0x760 [ 2156.538686] sock_sendmsg+0xd5/0x120 [ 2156.542431] ___sys_sendmsg+0x7fd/0x930 [ 2156.546447] ? copy_msghdr_from_user+0x580/0x580 [ 2156.551237] ? lock_downgrade+0x900/0x900 [ 2156.555425] ? proc_fail_nth_write+0x9e/0x210 [ 2156.559959] ? __fget_light+0x2e9/0x430 [ 2156.564005] ? fget_raw+0x20/0x20 [ 2156.567486] ? find_held_lock+0x36/0x1c0 [ 2156.571594] ? kasan_check_write+0x14/0x20 [ 2156.575856] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 2156.580829] ? wait_for_completion+0x8a0/0x8a0 [ 2156.585469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2156.591037] ? sockfd_lookup_light+0xc5/0x160 [ 2156.595571] __sys_sendmsg+0x11d/0x280 [ 2156.599495] ? __ia32_sys_shutdown+0x80/0x80 [ 2156.603939] ? __sb_end_write+0xd9/0x110 [ 2156.608046] ? fput+0x130/0x1a0 [ 2156.611354] ? do_syscall_64+0x9a/0x820 [ 2156.615354] ? do_syscall_64+0x9a/0x820 [ 2156.619379] ? trace_hardirqs_off_caller+0x310/0x310 [ 2156.624531] __x64_sys_sendmsg+0x78/0xb0 [ 2156.628628] do_syscall_64+0x1b9/0x820 [ 2156.632556] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2156.637955] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2156.642917] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2156.647798] ? trace_hardirqs_on_caller+0x310/0x310 [ 2156.652860] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2156.657925] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2156.662990] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2156.667880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2156.673096] RIP: 0033:0x457659 [ 2156.676322] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2156.695255] RSP: 002b:00007fb971b7ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2156.703000] RAX: ffffffffffffffda RBX: 00007fb971b7ec90 RCX: 0000000000457659 05:52:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getownex(r0, 0x10, &(0x7f0000000480)={0x0, 0x0}) getpid() r3 = creat(&(0x7f0000000540)='./file0\x00', 0x80) ioctl$KVM_GET_API_VERSION(r3, 0xae00, 0x0) prlimit64(r2, 0x4, &(0x7f00000004c0)={0x5, 0x3}, &(0x7f0000000500)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000580)=ANY=[@ANYBLOB="0600000000000000000000000000000000000000000000000000000000000000feffffff"]) r4 = gettid() wait4(0x0, 0x0, 0x1000001, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x29) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") r5 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x94, 0x180) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={r2, r3, 0x0, 0x14, &(0x7f0000000600)="757365722b6e6f646576d8656d30247070703100", 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={r4, r3, 0x0, 0x1f, &(0x7f00000005c0)='cpuseteth1vboxnet0\'proc]\'GPLK]\x00', r6}, 0x30) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r5, 0x800448d2, &(0x7f0000000300)={0x4, &(0x7f0000000080)=[{}, {}, {}, {}]}) rt_sigqueueinfo(r4, 0xf, &(0x7f0000000340)={0x41, 0x5, 0xba8, 0x800}) ptrace$cont(0x1f, r4, 0x0, 0x0) get_mempolicy(&(0x7f0000000380), &(0x7f00000003c0), 0x76, &(0x7f0000ffb000/0x4000)=nil, 0x5) [ 2156.710304] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 2156.717602] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2156.724904] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb971b7f6d4 [ 2156.732213] R13: 00000000004c40d7 R14: 00000000004d67a8 R15: 0000000000000005 05:52:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='srusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:02 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x5, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x4, 0x0, 0x0) close(r2) close(r1) 05:52:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x8780) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000080)={0x1f000, 0x1000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r2, 0x0, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x1c419) 05:52:02 executing program 1 (fault-call:2 fault-nth:2): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2156.945170] __nla_parse: 6 callbacks suppressed [ 2156.945183] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2156.959440] FAULT_INJECTION: forcing a failure. [ 2156.959440] name failslab, interval 1, probability 0, space 0, times 0 [ 2156.974028] CPU: 0 PID: 10661 Comm: syz-executor1 Not tainted 4.20.0-rc5-next-20181207+ #163 [ 2156.982653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2156.992043] Call Trace: [ 2156.992075] dump_stack+0x244/0x39d [ 2156.992101] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2156.992124] ? perf_trace_lock+0x4a7/0x7a0 [ 2156.992178] should_fail.cold.4+0xa/0x17 [ 2156.992205] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2156.992227] ? __mutex_unlock_slowpath+0x43c/0x8c0 [ 2156.992258] ? wait_for_completion+0x8a0/0x8a0 [ 2156.992291] ? check_preemption_disabled+0x48/0x280 [ 2157.022053] ? find_held_lock+0x36/0x1c0 [ 2157.022121] ? perf_trace_sched_process_exec+0x860/0x860 [ 2157.041299] __should_failslab+0x124/0x180 [ 2157.041324] should_failslab+0x9/0x14 [ 2157.041351] kmem_cache_alloc_node+0x273/0x730 [ 2157.054001] ? check_preemption_disabled+0x48/0x280 [ 2157.059080] __alloc_skb+0x119/0x770 [ 2157.062821] ? __lock_is_held+0xb5/0x140 [ 2157.062853] ? netdev_alloc_frag+0x1f0/0x1f0 [ 2157.062886] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2157.076949] ? rtnl_get_link+0x170/0x370 [ 2157.081102] ? tc_get_tfilter+0xae0/0xae0 [ 2157.085303] netlink_ack+0x2c5/0xb80 [ 2157.089061] ? netlink_sendmsg+0xfc0/0xfc0 [ 2157.093350] netlink_rcv_skb+0x35d/0x440 [ 2157.097455] ? rtnl_fdb_dump+0xd00/0xd00 [ 2157.101558] ? netlink_ack+0xb80/0xb80 [ 2157.105477] ? rcu_read_unlock_special+0x370/0x370 [ 2157.110475] rtnetlink_rcv+0x1c/0x20 [ 2157.114222] netlink_unicast+0x5a5/0x760 [ 2157.118340] ? netlink_attachskb+0x9a0/0x9a0 [ 2157.122790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2157.128366] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2157.133432] netlink_sendmsg+0xa18/0xfc0 [ 2157.137553] ? netlink_unicast+0x760/0x760 [ 2157.141827] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 2157.146814] ? apparmor_socket_sendmsg+0x29/0x30 [ 2157.151609] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2157.157200] ? security_socket_sendmsg+0x94/0xc0 [ 2157.161994] ? netlink_unicast+0x760/0x760 [ 2157.166265] sock_sendmsg+0xd5/0x120 [ 2157.170032] ___sys_sendmsg+0x7fd/0x930 [ 2157.174052] ? copy_msghdr_from_user+0x580/0x580 [ 2157.178847] ? lock_downgrade+0x900/0x900 [ 2157.183055] ? proc_fail_nth_write+0x9e/0x210 [ 2157.187602] ? __fget_light+0x2e9/0x430 [ 2157.191608] ? fget_raw+0x20/0x20 [ 2157.195087] ? find_held_lock+0x36/0x1c0 [ 2157.199230] ? kasan_check_write+0x14/0x20 [ 2157.203503] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 2157.208489] ? wait_for_completion+0x8a0/0x8a0 [ 2157.213178] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2157.218759] ? sockfd_lookup_light+0xc5/0x160 [ 2157.223300] __sys_sendmsg+0x11d/0x280 [ 2157.227229] ? __ia32_sys_shutdown+0x80/0x80 [ 2157.231671] ? __sb_end_write+0xd9/0x110 [ 2157.235777] ? fput+0x130/0x1a0 [ 2157.239100] ? do_syscall_64+0x9a/0x820 05:52:03 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2157.243113] ? do_syscall_64+0x9a/0x820 [ 2157.247174] ? trace_hardirqs_off_caller+0x310/0x310 [ 2157.252323] __x64_sys_sendmsg+0x78/0xb0 [ 2157.256425] do_syscall_64+0x1b9/0x820 [ 2157.260338] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2157.265761] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2157.270722] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2157.275611] ? trace_hardirqs_on_caller+0x310/0x310 [ 2157.280669] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2157.285726] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2157.290881] ? trace_hardirqs_off_thunk+0x1a/0x1c 05:52:03 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x214002, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x44041, 0x0) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x80000001, 0x200) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xc2) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', r3}) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r2, 0x0, 0x0) [ 2157.295771] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2157.300992] RIP: 0033:0x457659 [ 2157.304209] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2157.323148] RSP: 002b:00007fb971b7ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2157.323173] RAX: ffffffffffffffda RBX: 00007fb971b7ec90 RCX: 0000000000457659 [ 2157.323184] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 05:52:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x46, 0x0, 0x0) close(r2) close(r1) [ 2157.323196] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2157.323208] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb971b7f6d4 [ 2157.323220] R13: 00000000004c40d7 R14: 00000000004d67a8 R15: 0000000000000005 05:52:03 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x6c00000000000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trutted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:03 executing program 1 (fault-call:2 fault-nth:3): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:03 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x74}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x12, 0x0, 0x0) close(r2) close(r1) [ 2157.513762] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2157.525787] FAULT_INJECTION: forcing a failure. [ 2157.525787] name failslab, interval 1, probability 0, space 0, times 0 [ 2157.562834] CPU: 0 PID: 10687 Comm: syz-executor1 Not tainted 4.20.0-rc5-next-20181207+ #163 [ 2157.571473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2157.580878] Call Trace: [ 2157.583525] dump_stack+0x244/0x39d [ 2157.587211] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2157.592441] ? perf_trace_lock+0x4a7/0x7a0 [ 2157.596734] should_fail.cold.4+0xa/0x17 [ 2157.600834] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2157.605970] ? __save_stack_trace+0x8d/0xf0 [ 2157.610356] ? save_stack+0xa9/0xd0 [ 2157.614014] ? save_stack+0x43/0xd0 [ 2157.617675] ? find_held_lock+0x36/0x1c0 [ 2157.621814] ? perf_trace_sched_process_exec+0x860/0x860 [ 2157.627301] ? check_preemption_disabled+0x48/0x280 [ 2157.632355] __should_failslab+0x124/0x180 [ 2157.636624] should_failslab+0x9/0x14 [ 2157.640453] kmem_cache_alloc_node_trace+0x277/0x740 [ 2157.645617] ? __alloc_skb+0x119/0x770 [ 2157.649560] __kmalloc_node_track_caller+0x3c/0x70 [ 2157.654536] __kmalloc_reserve.isra.38+0x41/0xe0 [ 2157.659327] __alloc_skb+0x155/0x770 [ 2157.663073] ? __lock_is_held+0xb5/0x140 [ 2157.667209] ? netdev_alloc_frag+0x1f0/0x1f0 [ 2157.671653] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2157.677231] ? rtnl_get_link+0x170/0x370 [ 2157.681362] ? tc_get_tfilter+0xae0/0xae0 [ 2157.685550] netlink_ack+0x2c5/0xb80 [ 2157.689303] ? netlink_sendmsg+0xfc0/0xfc0 [ 2157.693610] netlink_rcv_skb+0x35d/0x440 [ 2157.697718] ? rtnl_fdb_dump+0xd00/0xd00 [ 2157.701808] ? netlink_ack+0xb80/0xb80 [ 2157.705736] ? rcu_read_unlock_special+0x370/0x370 [ 2157.710721] rtnetlink_rcv+0x1c/0x20 [ 2157.714465] netlink_unicast+0x5a5/0x760 [ 2157.718568] ? netlink_attachskb+0x9a0/0x9a0 [ 2157.723024] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2157.728606] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2157.733675] netlink_sendmsg+0xa18/0xfc0 [ 2157.737787] ? netlink_unicast+0x760/0x760 [ 2157.742066] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 2157.747085] ? apparmor_socket_sendmsg+0x29/0x30 [ 2157.751889] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2157.757477] ? security_socket_sendmsg+0x94/0xc0 [ 2157.762261] ? netlink_unicast+0x760/0x760 [ 2157.766536] sock_sendmsg+0xd5/0x120 [ 2157.770281] ___sys_sendmsg+0x7fd/0x930 [ 2157.774303] ? copy_msghdr_from_user+0x580/0x580 [ 2157.779093] ? lock_downgrade+0x900/0x900 [ 2157.783289] ? proc_fail_nth_write+0x9e/0x210 [ 2157.787844] ? __fget_light+0x2e9/0x430 [ 2157.791849] ? fget_raw+0x20/0x20 [ 2157.795333] ? find_held_lock+0x36/0x1c0 [ 2157.799436] ? kasan_check_write+0x14/0x20 [ 2157.803701] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 2157.808684] ? wait_for_completion+0x8a0/0x8a0 05:52:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trussed.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x15, 0x0, 0x0) close(r2) close(r1) [ 2157.813346] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2157.818922] ? sockfd_lookup_light+0xc5/0x160 [ 2157.823445] __sys_sendmsg+0x11d/0x280 [ 2157.827362] ? __ia32_sys_shutdown+0x80/0x80 [ 2157.831801] ? __sb_end_write+0xd9/0x110 [ 2157.835904] ? fput+0x130/0x1a0 [ 2157.839212] ? do_syscall_64+0x9a/0x820 [ 2157.843217] ? do_syscall_64+0x9a/0x820 [ 2157.847240] ? trace_hardirqs_off_caller+0x310/0x310 [ 2157.852393] __x64_sys_sendmsg+0x78/0xb0 [ 2157.856487] do_syscall_64+0x1b9/0x820 [ 2157.860404] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2157.865800] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2157.870754] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2157.875629] ? trace_hardirqs_on_caller+0x310/0x310 [ 2157.880676] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2157.885721] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2157.890779] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2157.895665] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2157.900877] RIP: 0033:0x457659 [ 2157.904094] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2157.923027] RSP: 002b:00007fb971b7ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2157.930762] RAX: ffffffffffffffda RBX: 00007fb971b7ec90 RCX: 0000000000457659 [ 2157.938055] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000004 [ 2157.945364] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2157.952657] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb971b7f6d4 [ 2157.959949] R13: 00000000004c40d7 R14: 00000000004d67a8 R15: 0000000000000005 05:52:04 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfdffffff00000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x4e, 0x0, 0x0) close(r2) close(r1) 05:52:04 executing program 1 (fault-call:2 fault-nth:4): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2158.221412] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = syz_open_procfs(r1, &(0x7f0000000040)='ns\x00') write$P9_RWRITE(r2, &(0x7f0000000080)={0xb, 0x77, 0x1, 0x7555}, 0xb) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'\x00', 0x0}) accept$packet(r2, &(0x7f0000001740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001780)=0x14) sendmsg$nl_route(r2, &(0x7f0000001840)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8c0000}, 0xc, &(0x7f0000001800)={&(0x7f00000017c0)=@bridge_newneigh={0x38, 0x1c, 0x504, 0x70bd27, 0x25dfdbff, {0x1f, 0x0, 0x0, r3, 0x1, 0x4, 0xb}, [@NDA_IFINDEX={0x8, 0x8, r4}, @NDA_LLADDR={0xc, 0x2, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, @NDA_MASTER={0x8, 0x9, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x4004000}, 0x8000) ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:06 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted/overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:06 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x63}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x2e, 0x0, 0x0) close(r2) close(r1) 05:52:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) r2 = getuid() getresuid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f0000000180)) mount$9p_xen(&(0x7f0000000040)='vmnet1&\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x20000, &(0x7f00000001c0)={'trans=xen,', {[{@cache_mmap='cache=mmap'}, {@mmap='mmap'}, {@msize={'msize', 0x3d, 0x7}}], [{@uid_eq={'uid', 0x3d, r2}}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'keyring[trustedvmnet0'}}, {@fowner_gt={'fowner>', r3}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@subj_user={'subj_user', 0x3d, 'vboxnet1system'}}]}}) ptrace$cont(0x9, r1, 0x8, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:06 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='com.apple.FinderInfo\x00') r2 = dup3(r0, r1, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() ptrace$peek(0x2, r3, &(0x7f0000000040)) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$cont(0x3f, r3, 0x40, 0x81) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r3, 0x0, 0x0) 05:52:06 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x6, 0x0, 0x0) close(r2) close(r1) [ 2160.505359] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay/opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf00000000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2160.642173] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2160.652920] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:06 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x49, 0x0, 0x0) close(r2) close(r1) 05:52:06 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x3f00000000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2160.858471] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2160.870944] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:07 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x9801000000000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:07 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x38, 0x0, 0x0) close(r2) close(r1) 05:52:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x8000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x507100, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x8) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r2, 0x0, 0x0) 05:52:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x400300, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x4c, 0x0, 0x0) close(r2) close(r1) 05:52:09 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:09 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0xc800000000000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) [ 2163.551531] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2163.595354] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x7fffe, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x400, 0x4, 0x7, 0x9, 0x6}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={r2, @in6={{0xa, 0x4e24, 0x800, @mcast1, 0x7}}, 0x6ae3, 0xda8, 0x1, 0x150, 0xa}, &(0x7f00000001c0)=0x98) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x29) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r3, 0x0, 0x0) 05:52:09 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)="747275737465642e6f7665726c61792e6f7061717565ff", 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x8, 0x0, 0x0) close(r2) close(r1) 05:52:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x6000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x200, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x2, 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x10000014c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000080)) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) [ 2163.792924] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2163.830040] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:09 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x4d, 0x0, 0x0) close(r2) close(r1) 05:52:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:10 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x6, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) [ 2164.014847] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2164.041042] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:10 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0xbc00000000000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:10 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x39, 0x0, 0x0) close(r2) close(r1) 05:52:10 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xffffff9e, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)="747275737465642e6f7665726c61792e6f7061717565f6", 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) [ 2164.437011] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2164.454220] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:10 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:10 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)="747275737465642e6f7665726c61792e6f7061717565fe", 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0xb, 0x0, 0x0) close(r2) close(r1) [ 2164.655746] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2164.668838] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r2, 0x0, 0x0) 05:52:13 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x4000000000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x1a, 0x0, 0x0) close(r2) close(r1) 05:52:13 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x300}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)="747275737465642e6f7665726c61792e6f706171756502", 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:13 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4800}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r0, 0x80000) r1 = syz_open_dev$usb(&(0x7f0000001ac0)='/dev/bus/usb/00#/00#\x00', 0x7, 0x20002) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x100) clone(0x1000000000100000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000001b00)=0x100) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) ptrace$cont(0x14, r2, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200, 0x10) ioctl$SG_IO(r3, 0x2285, &(0x7f0000001900)={0x0, 0xfffffffffffffffc, 0xa9, 0x6, @scatter={0x9, 0x0, &(0x7f0000001680)=[{&(0x7f0000000080)=""/28, 0x1c}, {&(0x7f00000000c0)=""/206, 0xce}, {&(0x7f00000001c0)=""/242, 0xf2}, {&(0x7f00000002c0)=""/40, 0x28}, {&(0x7f0000000300)=""/235, 0xeb}, {&(0x7f0000000480)=""/183, 0xb7}, {&(0x7f0000000540)=""/50, 0x32}, {&(0x7f0000000580)=""/215, 0xd7}, {&(0x7f0000000680)=""/4096, 0x1000}]}, &(0x7f0000001740)="9c0b44b6eaa067c8e589c1c40ba53e7908db5ca4f91310ad2c4ef5589ee54853683facbce683065d7ed4525d66dedab0aaa3a51a2730681b514fec90643397ca441e4151896be19a3a2f7fb8c7000124f7b31be54df6531a95035a5b738623673c946d263009b93a72219d9d3474ea162eefed1a8783b53fd54c7951328ee35ed595e0edf004f35ec0113d9a378eb5d3c3eb65cba9540f1ee53e8c4ece88e7617ef0fab517d584fa21", &(0x7f0000001800)=""/148, 0x7, 0x10000, 0x3, &(0x7f00000018c0)}) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r2, 0x0, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f0000001980)={{0x0, 0x1, 0x0, 0x40, 0x9, 0x200, 0x100, 0x6, 0x170, 0x4, 0x1, 0x7c}, {0x4, 0x0, 0xc, 0x6, 0x7, 0x32, 0x200, 0x8, 0x6, 0xfffffffffffffde9, 0x8095, 0x5321}, {0x0, 0x6000, 0x10, 0x3ff, 0x8, 0xfffffffffffffe00, 0x8ff7, 0x1b7, 0x8, 0x6, 0x633, 0x18}, {0x0, 0x0, 0x0, 0x1000000000, 0x3, 0xfffffffffffffffd, 0x9, 0xffffffff, 0x8, 0x7, 0x401dd72c, 0xc000000000000}, {0x105000, 0x105000, 0xf, 0x4, 0x7f, 0x81, 0xfffffffffffffffa, 0x8, 0xfffffffffffffffc, 0x6, 0x7567, 0x7}, {0x3000, 0x4000, 0x4, 0x4, 0x2, 0x0, 0x401, 0x9d, 0xffffffffffffff54, 0x3, 0x80000001, 0x9}, {0x5000, 0x0, 0xb, 0x5, 0x800, 0x0, 0x2, 0x11a, 0x2, 0xfffffffffffffffa, 0x4, 0x9}, {0x6000, 0x4000, 0xb, 0xa3e, 0x5, 0xffff, 0x100000001, 0x7910, 0x6, 0x6883a03f, 0xab, 0x401}, {0x2000, 0x100000}, {0x5, 0x113004}, 0x0, 0x0, 0xd000, 0x40000, 0x2, 0x9500, 0x1f000, [0x8a5f, 0x5, 0x100000001, 0x400]}) 05:52:13 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:13 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x1d, 0x0, 0x0) close(r2) close(r1) 05:52:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:13 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x7400000000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x40, 0x50000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:13 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x37, 0x0, 0x0) close(r2) close(r1) 05:52:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:13 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x74000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:14 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x12c}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x80000500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:14 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:14 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x300, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x3a, 0x0, 0x0) close(r2) close(r1) 05:52:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x374b, 0x40000) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x10000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x2, {0x8000, 0x6, "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", 0x7f, 0x2, 0xffffffff, 0x9, 0x6, 0x1, 0xffffffffffffffe1, 0x1}, r3}}, 0x128) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:14 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x400000000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(r1, 0x0, 0x400080000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:14 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x23, 0x0, 0x0) close(r2) close(r1) 05:52:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:14 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0xc000000000000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:14 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x600000000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x80082, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @local}, &(0x7f00000000c0)=0xc) ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x32, 0x0, 0x0) close(r2) close(r1) 05:52:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)="747275737465642e6f7665726c61792e6f7061717565ff", 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:14 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfbffffff}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) futex(&(0x7f0000000040)=0x2, 0x4, 0x1, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x2) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) [ 2168.859104] __nla_parse: 12 callbacks suppressed [ 2168.859115] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2168.918103] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:15 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7a00}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)="747275737465642e6f7665726c61792e6f7061717565ff", 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x21, 0x0, 0x0) close(r2) close(r1) 05:52:15 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x4000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2169.164359] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2169.196741] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:15 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6800}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:15 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x5005}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:15 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x48000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x2b, 0x0, 0x0) close(r2) close(r1) 05:52:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:15 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff80}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2169.789485] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2169.816273] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:15 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x34000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2169.975844] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2169.994829] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:18 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x22, 0x0, 0x0) close(r2) close(r1) 05:52:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:18 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x48, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:18 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x1a0}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) [ 2171.995494] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2172.035320] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x33, 0x0, 0x0) close(r2) close(r1) 05:52:18 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x40030000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:18 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:18 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf0ffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x3b, 0x0, 0x0) close(r2) close(r1) 05:52:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(r1, 0x0, 0x11, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) wait4(r1, &(0x7f0000000040), 0x60000000, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:21 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x400300}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:21 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x4800, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x4a, 0x0, 0x0) close(r2) close(r1) 05:52:21 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x5000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) [ 2175.056053] __nla_parse: 4 callbacks suppressed [ 2175.056064] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ptrace$peekuser(0x3, r1, 0x3) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) [ 2175.122984] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:21 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4800}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:21 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xffffff7f, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x1b, 0x0, 0x0) close(r2) close(r1) [ 2175.301613] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2175.317111] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:21 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6c}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:21 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x500, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)="747275737465642e6f7665726c61792e6f70617175658c", 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x2f, 0x0, 0x0) close(r2) close(r1) [ 2175.488100] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:21 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2175.540431] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:21 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2175.678226] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2175.700002] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:21 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0xd010017f}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x410000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x6, 0x101, "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", 0x9e, 0x400, 0x4fab, 0xc261, 0x7, 0x3ff, 0x4d, 0x1}, r3}}, 0x120) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) clone(0x8200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x3fc, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x40) ioctl$KVM_HYPERV_EVENTFD(r4, 0x4018aebd, &(0x7f00000000c0)={0x0, r5}) r6 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x29) sched_setaffinity(r6, 0x8, &(0x7f00000003c0)=0x10000) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x81}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000480)={r7, 0x1000, "db9413d036cfabfe1b6a7ed46424890eb7b22380076787cd5c22b531261b2a8ca63a8264b9194980326e56ae3ecd925550f39513042bf6f707584c2d2afeb342550e47b460a3a27fdd66d14b1f0d8f34608a4b428e1dac5ad453bc546cde657795a55dba4fb26e24c59e65a530c6c0964e3c8e03bf4673c8f85375950ca34d24253eb93435dcf3e02e573835765abd8d42e927abe74ec1b638d6d4f1688792f3e644f7243f8c64fc9de6a79f726d708eba94c0a09ee40387c1bce87e6d847ce31d74adbcd15e2663ce5b03b2b2ab286fce78b54a7cb4473540bc06eaece1f12cca6a6835fb7656b1d0378f62ccc5c0afc59a0bd38861aa3033352d84210ce3f35630c8962a9a60ed0396ddaf7fb101de205711e6fc3a989cac025da2ba23ce972e5ebc778b9641452fca332113dc35d6892a05975b93bfc01aa3cbe9192538f4fb956aea4a12a2d08aef55b1d42ff737c4b0f6bfab3288e0ed1e44ac6a2502206cbe5b09ccc418a9745c5c580469de30dfeb777b6eb35f175ef645385de1796527b2c08cccc9c901d4affe0dbe6e7fea186a4cea33113c568738407246b3bab535053333cf3b62bed4ebee2bd9efd6d8271745dd785d569afc71a9d6b6b8c2bc70bce81fbbdcef7e570b863cce05ed4eadf8c18f86e87915f85e16af86570f243f2e387bf4103aa0708f2c10ab547edebab06e875172387ef03a9880e76e69f62210b7061997c6e3d940a803145b7419b38b1ffb2a1fe3829936f49327f827573481a53f4ef42dcfeced247f322d7a644badfb3146b0fcd1cd082a3b316bb97f6f7af278d5aadbd0f239db0bb74d454ad84232cd1a38be5db2cb443129d3c3d2cbd8802d8e5731a34b6bf2a8d1f333bad3903f6371539175cc2a8d82732ef5856a62503194b7349185b4a58305f037ca58bdc6c5b7c3c0d15a20dd290b71b0d5f95f1eac8ed69119bd59836080d5e81a3f8047c2507b963711903f5a0a3f676c7d84d2948fe6811c396117da9c764e10f8fec0a7662fa4e7d2cca092e01c2a138d662df66c7ac8a86d30948c0a43e4520d67da20cab6c77276458195973e476522b1d5ae13b56ed56597da0bed57fd238be3b056eb1c1e889fc1bf1587903f928d6048f05a5183b2dd9de9a63f5068f5cfe9cb22f4962a6d8cf2d71061235945ceb4e3f6a79d61cd095d6bf601f11b7e1a7b4d7bda80da0f051fbefc179b409b7ba1d85c677a26c1f4907bc4e22ab1e42adcbe7d6727f3dda6a80eadcca08b62198f07caf9b399c040ff4ca15ea9057fb070faacc554774e35509ebfa93de4335fc2a710d759944bc0b0d1b15802a97485ef1fcadf16b67e380206ee8583f654d99b8a138669250a946de844c4e86f4758f5004047effddf127e9a74bc16dc76c2b98a8d712f317997d1da5e016006427dd9516008a9d050e0aea2da40c4f91a57419aa95b2d749b5e65705b846e166e7c688e4e0b6a4f6a470e6e90c3af136de073026c33da9b759326fe8d1b75dfec8b4ef0cfd9d3677b11f34d6ffd4e74a8240865bf322e379afdb8028364e00113f53d3b3468e01c5107a2dd52646ae83e8ed1826612a163b44fad23d2588bb4f4279a9c037c4bfcc0f8e824a2bd0a82e665cf1c0d7195f6dfcbca2840da4604d70f14c14e7af58466c96a3b7d0c172974f9a2e8cf57a0246988105b550cee88bc75928fc24995b7471705e1fb841cd5744c061dae2111ba01ea2aabd7e2b93dc9e418fefb6718dff13521ef5c72ba6edaa9a92695f77c818394b7029f64f3e03433897e425032018b9974fae6d0b13500a29b86df3699c38eaa640e23af28df389a9f03eb25f264852b9ebf7a9aebdb94f34ffd1e348c8688cc5ee90b0712bf0c6ba01b689cd8c26e4234b9dfaa45886c53b8455d49a27bd5aca58057b3e2a1810ffe282f76faa1aedf7e4d9ac1ac4524c5cbeb4fe9d7b681e9e2adcaa9618e73213e286d83302a03760ec2ab63971e42546f8bf755fffdda5de18e63f2250051d030f110a49b0283d2a3db8a64338bd28cf30b68ecdcc38ec334613c6f289543f0471ec35031af2a89470d73f04d8a035e4eeff73d6f57abd792cac4263600ff510b8385d514ef61aaf8d777786d1b5659ece3f7af01d920f181c24e0578391e4aa355ece96ecbb6d33276abdd482740f6db99569ce47dc23b6b2553e97926bbf0c16566f6ed17fb90b05394a6a57db9d425b38a544afdf9f314e2836309333389f48f450e326c980766d3a521e38882c5f62d8d98cd51593f1c93ba40b1880646a4194d061af35c834f7fc11cacfcf9c3a9a8845deb95ff1350d9d208d81bc28c5419f6b93941fd905773707abdce6ee723ab5b471ea6bd29749cde214384a990453e64cabc7b0eceaa518cb266ce245a35f0243fdb35ff3bd426406a66468110c8277349082dca30a187c5a65766241572ae3065b4e5ffd7ac1a66ffa541b19dfa526b42392f5093fb3487cfa81d65cf6d19f51accf4bb2cd339b2bd7c442b6b1b3b5ded3368a28b2cfecf662fed33c13373ac8c0dd753c72f87839966059cd2869de3eb532b94c71d66aa6fbeee73c10d6f8677b1ee01263b88354de46f62d2d2211ba2343c321ae371553ed2e4dcddb08986c18fb60050090637990118bb0b44387ebf9a59ebcd3a02636b75b12aa1cc834fe7c9a89dc192722feafce59798c794cd76c171c19dd2ca73bee46c0f118a724e833fc20d5c79627a823ac93a0f038c4734098ce8f2e3544623aab0d862d6a28707469128b34e02056e53e8dd238265661ee089157e896fe8ecb08a0c4cfb17114bff8917addd6b312735cb88623ddf31608fb75b0e9a577efe1de7962129f1a76b40148c32225e27adcffaed96c17ebd911d4fc65e075d9de5494fd11e7683273ab0c22cd6ec696ef8fc72dd7adff6c3de3c37609bd5a278d0246963ebc17eda5243fe032792e28ce170be3f7e4592449b671299fafeb200a2683bc94fb5cad01c7b542eb3dd3176cd77f02e80339c72f58c458a32c6b5e480c0420e96a59ad4633c5c9456f38eebdd9231a1ec07337a3cffc4394e142619d467b5babc4c51e91874ba64d580562e7df118f603a1cf8181efd7c974301e845e0bbd8f303d9024148562cc05859d94f8abb0f67c7b24a9a1faa31577330f1fb26a4cac87cb07c252b4df9c65575b78c00872176065f1d04a8cfd196f204ee6eef6a3b2ac0d99274f074de1d0aa7879c182c778dc608dbc63e74ee23783ae108d7bf3542386e5bd99c61d8b9b8547c8032cca5f9945eacc30687bf2cd5eb210c65f20875029105c77c43c0f0db53ba11d12d6075e3d2cc114829391fe5b19b135fed68dad983aad118f223f6c34b0707de793a6e48a12b704851edf5ab2ac97a6baabb261f4e0297fcde00db9ba4a4f4a865d1495348986278fd124b2bc9efdaacc05f2af5b8eaa2b2b01ea74d74973fd44ca878cdd67f41d55a6d54746d5950061cef5a78c28901037ef28d37a68b78676c7c9d368bb4fbe6d70300607e9090aa9d651c300ca0b724a9865a7ea62f91b9802e5731c997e84c3757d6f30cb1a5c2d1784a1d3b375100c9a5a92d29bd021b830b2b53855ce31dbef3fc425f19c23725a294e7fe89503f50f02303a891c63765917d788ed049e22dc9b140a6e34788e38175bb05635ccb97f29d0398fda4591e782c5305a71eb2f1f4aa9653339bf05a9f73150e49801280fc5b35c83c6812feb6c4f2c56cbca60568047cad195b9ccb8b11d68b24d68c6b1f4cbc420a5931898269258b7be66b72e7be25c321b73b4ea48d5140edcc92692f8b695497f6e680c833741a029113ec5fbe827d7ecdc390e193c57ae8470718359b278bda30cf1904f2844fe1d1c56c122ef895fe978c8855d6f6e3d1f8b1b02c62495f3c79b3b4bc359f67a070b3783e67acd033761d152be31c506b2f23f274bfdc65e490b74231b2570543564e8d60e8ab156fadbde4760ef455d6a5394a7f4c562b9e948d369d7a473288a8fa60a8735405a3b87b022e1e3df4b3fb97dbf42f370822e3deba5997c4d81a1c1c9d3ee491e1f7ed0e84493905f57a9783911f0f422def5bc867d8558be0d487f4f0a4749626c104274840ef234eaef92e7ebf1058f92d5c2842c51f70735e2b5e4b97e537ed4e704b3a0e84fa2b52f82a2c63c301dfe502d49bc498602d5225e5db79054cf467f7d44f6ba1c71eeb1b9347d3230999855d46fe0f3a44f0fb2098e51de0c5f10635db8a4f243086d7eebfc637bdc39d8aa6fd5dc1b92f8f464ae5d3fb583c2929d93a02efa1ee7a1a6330c22f8bec341017c2b58df9c99b9240898156f92d35b5fabda69caa74d01646c5410aa89f269dc71a2a71bc9ab951cd8c4c4aefcaf6bc4931f252cd86f7f9bd5280cb271973a75d3899595fe7d5dcf022efb2e72be8bdf5b546f476c30c291ad5c2366c1e5ef4036019bfacce62d89856879d615e6bf026717afcc044154103e8f523b81d27ed0879c8c5c97e03988116e8200fc73c40a63fa9b87024d3c019c340d89b7e2581978eb366618a914a05fa2ec70a16457bd55d641ed9a6b9ad64b6d226becd796c8af69b045e6723db9120fb4c5fc012e51228d21fd5b569c7778bb831da22d05a47cf6de364afbc7d436197745d80f544b5e5a1eb22fa0d4be8a4055f64acd4101069f24653cbf11b3e4f8080b2095b01d3b8a4595364a1e2a958cf2c7e84f7668513b29920ea66b1dbb2e77ff33e8dbe1a5f600178a06ca2038db8ae943f0760600dee27f2353768ad3580f867f75cf9b462648c75a042f500f2a7af8f5d10896537f6f95b8c0662779846aad1817dfcb1f7e618b402a50811d2c5c3e38cfcf07d5d1ef533f2dcbe4b74916887bdb0d0580a97d6f3be21ff206d0b075717fa201f5099418d483eefeca702357a8d7602801bd7fc7c670538cda7093e19380591443d35c99aca7b31a2655b46ccd59e8d93d3377a37ad161cfa0fe01ba548ed7f0d64ede18049039515b3139d69b761409581dde2dd9ff2a4a76fd55a863d66082951ba4a4b405c3321c42d1aac6914dbe45fc5940d72b71cbe7622a38a4b8eb848d1b7deae445fd28b8e76aff27f8b3d420f52d6c9b7c24561a1eaa53380c924bb78112930f7f6b797e77900eabd68d0aa72ed80166c4f9a996f551cd4ac1774bc79f05e461142838e924990ccc5031b370bc4917e3b925d27b892ef4a081f4506ec79a2b36d5472845e2db59eea3936226fbfec7c3bfc8a00cc3fb881fb651e18f163f7bec99b2222101ff2334fc5efe566551004997149c5aedd6e43c971897299db84cadf4f9d8f45346a8c75282c12bf2a060db00b8f2aa7890363e4c2a6f75c9900f83b459733e23fffe2e18993beb71d6e1664191d58669bbf1b9f3908df48e84f7d7eda089ed636ef70cbb93b559d6093e0f4fdb0ea03eaebe825d59fc27f54240b314e484da9c27263ad3090d12ae18d84181bd75e33b040d2c2d9d30cafe2c786762505a70916482638d57f1a6d5334233e43df6b9d46ddadcecd793aacc9414c17878dda29e017163fadeb2d50d343b2f7f3ebec4dbec815c42b882ef994e57bd4fd6e000f28862dd7c6299476fde243201f67f04d0cb1e4965aa9340097b211a39499bf91c497bfeef529807d7dd9a7f1be9c14c9bfaf4f43c93b17dc5fa09c1afbe8d20c59beffc1c6337168b28f877fe75160451917e77975a58931a46e08ea6e4703bc0010c124c52aa19f338cbf1a3a75f44ef98717ed01a8f457f8aab6455405c45a9c063c81a1c914b74564a"}, &(0x7f0000000380)=0x1008) ptrace$cont(0x18, r6, 0x0, 0x0) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r6, 0x0, 0x0) 05:52:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x2, 0x0, 0x0) close(r2) close(r1) 05:52:24 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:24 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xfffffff0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:24 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0xfc0110f0}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) [ 2178.266437] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2178.307648] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:24 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf0ffff, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x2d, 0x0, 0x0) close(r2) close(r1) 05:52:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x20000000, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x18, r1, 0x100000000000, 0x10) 05:52:24 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r2) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x29) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r3, 0x0, 0x0) 05:52:24 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x68000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x48, 0x0, 0x0) close(r2) close(r1) 05:52:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) rt_tgsigqueueinfo(r2, r3, 0x2, &(0x7f00000000c0)={0x21, 0x5, 0xf4a, 0x10000}) r4 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x29) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r4, 0x0, 0x0) tgkill(r2, r3, 0x28) shutdown(r0, 0x0) 05:52:24 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7400}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:25 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x34}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:25 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f00000000c0)={0xeb, {{0xa, 0x4e24, 0x100000001, @mcast1, 0x9}}, {{0xa, 0x4e20, 0x0, @remote, 0x7ff}}}, 0x108) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x5) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x8, 0x4000) ioctl$TIOCSPGRP(r3, 0x5410, &(0x7f0000000080)=r2) ptrace$cont(0x1f, r2, 0x0, 0x0) 05:52:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x3, 0x0, 0x0) close(r2) close(r1) 05:52:25 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x8100, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:25 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6c00}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400201) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000080)={0x10000, 0x80000000, 0x3, 0x3, 0x5, 0x5, 0x3, 0x0, 0x400, 0x10001}) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0xfffffffffffffffe) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000140)="4779f34b7d874a010000003f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21345a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ad8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c48ebbded6618aed1670408fea8df9ebd1e9a2d99c7832ca0b196b8d3770c8ab541ddd5e960c53d2b8bc4fef4e5cd9e3a8acfb2fb43e8f2410d7db2471014fc35b89df3ee404e6412645b380709018e4d36efa0418300061360e60b8a195e19c8d157fc3802b47707c05fbfa0a3ae51bb150f09a4f29b0ef1d47c019c351aecf49f978ba0c018cbcc1140f35955afde9130dcdd36839f57960342c6d7e6b0a61a9fb36d584ada1d072d6e93161a6fc835ac52c2021e34cc6e4da125680b4364616cc75b5572ac9055d565a83afa52e4a9223dbc2c856e5fb36fb86a37e42dea3bccbfc799dae40ee9fc1d2bc16dfe9dbe31525538e59b0d87f5621f85ca1866e40c4789e5e1151fd721fca5a7f17cd38ac62e81621f0681eda60f43cc7886db") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:25 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x4000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x19, 0x0, 0x0) close(r2) close(r1) 05:52:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x2, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:25 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7a}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:25 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x7400, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:26 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x60000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x3c, 0x0, 0x0) close(r2) close(r1) 05:52:26 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x4c, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x901f0000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:26 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40030000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2180.200956] __nla_parse: 12 callbacks suppressed [ 2180.200968] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2180.229536] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") 05:52:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x11, 0x0, 0x0) close(r2) close(r1) 05:52:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x200000000000000, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:28 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x7000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:28 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:28 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x6c05}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) [ 2182.298869] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2182.328491] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:28 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x48000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x1c, 0x0, 0x0) close(r2) close(r1) 05:52:28 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2182.484240] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x31, 0x0, 0x0) close(r2) close(r1) [ 2182.540440] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:28 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:28 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x6c000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2182.702924] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2182.720270] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x13102002002, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v1={0x1000000, [{0x1}]}, 0xc, 0x3) wait4(0x0, 0x0, 0x80000000, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x2, 0x60) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000140)={0x0, 0x5, 0x100000001, 0x20344e60, 0x80000000, 0x2}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e21, 0x2, @mcast2, 0x9652}, @in={0x2, 0x4e20, @rand_addr=0x13f}, @in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e20, 0x6, @mcast2, 0x52}, @in6={0xa, 0x4e24, 0x3, @empty, 0x6}], 0xa4) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r2, 0x0, 0x0) 05:52:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x30, 0x0, 0x0) close(r2) close(r1) 05:52:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x60000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:31 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x900}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0xf6ffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:31 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x5}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) [ 2185.351319] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2185.371253] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x3f000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x42, 0x0, 0x0) close(r2) close(r1) 05:52:31 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4c}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x200000, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000180)) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() chmod(&(0x7f0000000040)='./file0\x00', 0x10) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x15b, &(0x7f0000000080)="fdacd01b5f112b7cd5d8a5ba32adfafcef8867be13b1db4f063b71f64e72178f3455fb34e65fc5af4ad7ba74fef25d91ee7b9ac0db66add9fc98b34b3ffdfb3fa9974588482b1663c47256c3c8f13221b5889b87be1c5820d260c82d1a99e111df379dc116e21fcb8090629b35d8731e1cf58a1c5f3362478f3a1352a1c2891b8b2a998faf2f2d29d7011e41c78a94") [ 2185.533261] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2185.572762] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x14, 0x0, 0x0) close(r2) close(r1) 05:52:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x2000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:31 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x35, 0x0, 0x0) close(r2) close(r1) [ 2185.985086] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2186.007761] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:32 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x48}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:32 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x8, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x4000, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:32 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x7f0110b0}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x2a, 0x0, 0x0) close(r2) close(r1) 05:52:32 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:32 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2186.748980] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2186.767901] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:33 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x600000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x41, 0x0, 0x0) close(r2) close(r1) 05:52:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x4000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:33 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x68, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:33 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:33 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0xe00000000000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) [ 2187.202958] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x5, 0x0, 0x0) close(r2) close(r1) 05:52:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x4000000000000000, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) [ 2187.261717] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2187.264528] IPVS: ftp: loaded support on port[0] = 21 05:52:33 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x7a00000000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:33 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x74000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x13, 0x0, 0x0) close(r2) close(r1) 05:52:33 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf0ffffff, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x17, 0x0, 0x0) close(r2) close(r1) 05:52:33 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2188.469354] bridge0: port 1(bridge_slave_0) entered blocking state [ 2188.475964] bridge0: port 1(bridge_slave_0) entered disabled state [ 2188.483373] device bridge_slave_0 entered promiscuous mode [ 2188.529339] bridge0: port 2(bridge_slave_1) entered blocking state [ 2188.535868] bridge0: port 2(bridge_slave_1) entered disabled state [ 2188.543370] device bridge_slave_1 entered promiscuous mode [ 2188.589990] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2188.636665] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2188.776820] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2188.825249] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2189.046887] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2189.054364] team0: Port device team_slave_0 added [ 2189.098406] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2189.105998] team0: Port device team_slave_1 added [ 2189.152460] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2189.200634] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2189.247342] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2189.254481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2189.271117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2189.312656] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2189.320385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2189.337036] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2189.801923] bridge0: port 2(bridge_slave_1) entered blocking state [ 2189.808374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2189.815098] bridge0: port 1(bridge_slave_0) entered blocking state [ 2189.821464] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2189.831050] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2190.265067] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2191.568359] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2191.733209] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2191.897956] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2191.904164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2191.919835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2192.075107] 8021q: adding VLAN 0 to HW filter on device team0 05:52:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, &(0x7f0000000140)=0x10) setsockopt$inet_dccp_int(r1, 0x21, 0x10, &(0x7f0000000180)=0x3419, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x7ff, 0x1) ioctl$VIDIOC_S_TUNER(r3, 0x4054561e, &(0x7f0000000080)={0x5, "5d0045da9e04e48bb472a113ec014ec7ca57e08c1099d8a8472c90a68995e7cf", 0x5, 0x400, 0x22d, 0x2e2d, 0x5, 0x4, 0xfffffffffffffffe, 0xc5cd}) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r2, 0x0, 0x0) 05:52:39 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x901f, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:39 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f00}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x36, 0x0, 0x0) close(r2) close(r1) 05:52:39 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0xd01001ff}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x1000000000000, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) [ 2193.203481] __nla_parse: 4 callbacks suppressed [ 2193.203492] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x40000004208, r1, 0x200, 0x100048) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) [ 2193.256732] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:39 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x7a, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x3e, 0x0, 0x0) close(r2) close(r1) 05:52:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x7, 0x2002) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x98, r3, 0x301, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfff}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xffffffffffffff01}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1080000000000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5e}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x57}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000000}, 0x880) tkill(r1, 0x29) ptrace$setregs(0xf, r1, 0x7, &(0x7f0000000240)="0d9b62890c61abae308f0331a0894fd570d307515fd06687c170923b310fef64d6422ee80f7bb8178b2809c0c492ff66868a9e1ac2e127c3fb74c3617c84056866a7d893b69bdb4c1270c229451ff90e66fd315ef787c71e0ad1afa7424083e8b37329c5a06ef1c02409ef92d7120b78b5551af04b806a3c29eb799e8adea0d3210b7f15b2594cf3a0f4da") ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:39 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2193.379772] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2193.403577] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x200080, 0x0) setsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000080)={0x1, 0x3ff}, 0x2) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x58f) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0xfffffffffffffffd, &(0x7f0000000040)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") 05:52:39 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x500000000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x18, 0x0, 0x0) close(r2) close(r1) 05:52:39 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x700}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2193.606439] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2193.638584] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:40 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0xfa0110b0}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:40 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x7a00, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0x11, r1, 0x2, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c167854954d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d056622f1f796cab3077ded67382b1f3a9280ed8293144b1e70600000000000000c1ae98648b408a3205b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:40 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x16, 0x0, 0x0) close(r2) close(r1) 05:52:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0xfeffffff00000000, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) [ 2194.101295] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2194.134416] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000080)={0x2}, &(0x7f00000000c0), 0x8) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:40 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x6800, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x10, 0x0, 0x0) close(r2) close(r1) 05:52:40 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x34000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2194.303295] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2194.328576] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:40 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x8100000000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:41 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4c1d000000000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:41 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:41 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xffffff7f00000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x43, 0x0, 0x0) close(r2) close(r1) 05:52:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x3f00000000000000, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:41 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x5000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x4b, 0x0, 0x0) close(r2) close(r1) 05:52:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") wait4(r1, 0x0, 0x1, &(0x7f0000000040)) ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:43 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:43 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x3f00, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x706000) close(r2) close(r1) 05:52:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0xf6ffffff00000000, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:43 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x9ac4200000000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:43 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x74, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x930000) close(r2) close(r1) 05:52:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x8, 0x200000004) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:43 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpgid(0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0xffffffff, &(0x7f0000000200)=""/198) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1040000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x7fffffff, 0x0) timer_create(0x7, &(0x7f00000001c0)={0x0, 0x5, 0x0, @tid=r2}, 0xffffffffffffffff) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000100)=0x54) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000140), &(0x7f0000000180)=0x8) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x1, 0x2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r2, 0x0, 0x0) 05:52:43 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:43 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfdffffff}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x400000000000) close(r2) close(r1) 05:52:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x40000400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:43 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x100000000000000, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() timer_create(0x6, &(0x7f00000000c0)={0x0, 0xe, 0x3, @thr={&(0x7f0000000040)="ed9703cb9318203eb7027540dcc38a6a979559a33c1a31b3705da6773869076d9ae226b63117251145a2889a834c3f2fe0ec5da60610d0f18b2fbb6e027bf60982e469b3f103", &(0x7f0000000480)="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"}}, &(0x7f0000000100)=0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(r2, 0x0, &(0x7f0000000180)={{r3, r4+30000000}, {0x0, 0x1c9c380}}, &(0x7f00000001c0)) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$setopts(0x4206, r1, 0x3, 0x100010) ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:44 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x4800000000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:44 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x6c000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x60700000000000) close(r2) close(r1) [ 2198.210083] __nla_parse: 14 callbacks suppressed [ 2198.210092] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:44 executing program 5: modify_ldt$write(0x1, &(0x7f0000000040)={0x1, 0x20000000, 0x4000, 0x6, 0x1, 0x2, 0x4, 0x1f, 0x7ff, 0x6}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000240)=0x2, 0x4) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x7, 0x58200) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e24, @empty}}, 0x200, 0xd7, 0x7, 0x6, 0xe2}, &(0x7f0000000180)=0x98) sched_setaffinity(r1, 0x8, &(0x7f0000000200)=0x7) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f00000001c0)={r3, 0x7}, 0x8) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) [ 2198.256619] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0xffefffffff7f0000) close(r2) close(r1) 05:52:44 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:44 executing program 5: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) wait4(r0, &(0x7f0000000100), 0x41000001, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0xfffffffffffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x29) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r3, 0x0, 0x0) fcntl$setown(r1, 0x8, r3) 05:52:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x9300) close(r2) close(r1) [ 2198.411336] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2198.450487] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x1000000, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:45 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x60, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x730000) close(r2) close(r1) 05:52:45 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x128ced474f6}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2199.076613] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2199.109973] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:45 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x1000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x507000) close(r2) close(r1) [ 2199.242567] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2199.264656] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:45 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x9effffff, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2199.406529] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2199.445724] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r2, 0x0, 0x0) r3 = dup3(r1, r0, 0x80000) kcmp$KCMP_EPOLL_TFD(r2, r2, 0x7, r1, &(0x7f0000000040)={r3, r0, 0x654}) 05:52:47 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x60ffffffffff) close(r2) close(r1) 05:52:47 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x7a000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x3f00, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:47 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x320}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:47 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7, 0x80402) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r2, 0x0, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000080)) 05:52:47 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x6c, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:47 executing program 5: r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x7f, 0x406200) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100)=0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(r2, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x440, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000080)=0x6, 0x4) ptrace$cont(0x1f, r2, 0x0, 0x0) 05:52:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0xf0700000000000) close(r2) close(r1) 05:52:47 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102002003, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xf, r2, 0x0, &(0x7f0000000080)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c3ebf3da12d00e0accda4d379238006504924d447098bee7099f9a4ec668d6f60b522fd48990728d5e6539da12e09c03b2f3dee22958d903a") ptrace$cont(0x1f, r2, 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x0, r1) ioctl$SCSI_IOCTL_GET_PCI(r3, 0x5387, &(0x7f0000000040)) 05:52:47 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x2000000000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x730000000000) close(r2) close(r1) 05:52:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000080)={0x5, 0x800, 0xbe1}) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r2, 0x0, 0x0) 05:52:47 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0xfffffffe, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:48 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x7}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:48 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x9effffff00000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r2, 0x0, 0x0) r3 = accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x3, 0x4, 0x2, 0x5, 0x94a, 0x1ff, 0x1000, 0x1000, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000140)={r4, 0x9c}, &(0x7f0000000180)=0x8) 05:52:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x607000) close(r2) close(r1) 05:52:48 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:48 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x6000000000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x5, 0x40) sendto$inet6(r2, &(0x7f0000000080)="69c05c0e250a1a22aa7aa09237c99f986f5d89ff2ceacc36d79db9516d9a6efe4db51166b68b1cd0cf2139e724b489490135e0d2166cec00937445c6b4dd3f58d3cd97e03ced3a9dbd4c8639580dccce80089ccc7e7f9e15a6a358acd21216d34cea8b80617afb55eb51c2e831257124a6b653a6d4d9673fa9699bcea2f24ecc5e04721a3f3373430b859bbdecf6d4a2ea90b6c1eed5bf4f6e850bf11ca6be4ef4baf53c644add4a4a45835e4b41aa6ef3e50a64b001460a4469c23fddb115ed3ebd7c8c7e7950dafc173d64158f7552bdc390792dce6af1b077de9b9b895a3d55eceba9942997a9168bce61a3540c440ae664", 0xf3, 0x4000, &(0x7f0000000180)={0xa, 0x4e23, 0x0, @loopback, 0x3}, 0x1c) ptrace$cont(0x37, r1, 0x20000000002, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0xf07000) close(r2) close(r1) 05:52:48 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x500}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r2, &(0x7f00000000c0)="d6fb594863a9aaab3e35a246a761aae32c4cf018e78c375e7104551228c9a6c5726c6f293cde34c012ee3d60d4a8f86a71ee1995419ca938430ee74f796c50d0b872c08fa3aa9a4825d8a23c5089d050b25956262fb23ecd80e44f12ef0b1ab3f52a08f97a814074b1caea585bc3853d385ada4b21e1d41bfbdc549feffcdc301fc1c4b4175104e32052d65cafd8a757707d46431229c8cb13d5377b7c010bf3b720451ea3d2947029049208f72b4bbf9e47b4c796509a50a7dc0d981612812a1c6ba521671ada712948519e74c6878d592046e281b126f4", 0xd8) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000080)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0xfffffff6, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:49 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x8000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x5, 0x8000) r2 = syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x2, 0x0) ioctl$VIDIOC_S_SELECTION(r2, 0xc040565f, &(0x7f0000000380)={0x0, 0x100, 0x2, {0x6f8, 0x5, 0x0, 0x1ff}}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x10d, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)={0x0, 0x1, [0x37a, 0x4, 0x4c2, 0x830]}) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = openat$cgroup_ro(r0, &(0x7f0000000200)='pids.events\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r5, 0x9}}, 0x10) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x29) ptrace$setopts(0x4200, r3, 0xba, 0x100000) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2, 0x0) getdents(r6, &(0x7f0000000480)=""/4096, 0x1000) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r3, 0x0, 0x0) 05:52:49 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x705000) close(r2) close(r1) 05:52:49 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x1c02}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x4, 0x181002) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x200200, 0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000100)={0x7005, &(0x7f0000000080), 0x6, r3, 0x1}) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) [ 2203.297240] __nla_parse: 10 callbacks suppressed [ 2203.297252] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:49 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2203.372559] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x100, 0x181) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000000080)=""/122) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x5, 0x8) ioctl$LOOP_CLR_FD(r1, 0x4c01) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000100)=0x4) ptrace$cont(0x1f, r2, 0x0, 0x0) sched_rr_get_interval(r2, &(0x7f0000000140)) 05:52:49 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xffffffff00000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x70f000) close(r2) close(r1) 05:52:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0xa) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 2203.519414] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2203.540559] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:50 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x901f000000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0xffffffff00000000, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:50 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80ffffff}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$setregs(0xf, r1, 0x1000, &(0x7f0000000040)="0091299834acfd3c07dc1690435bf9ee4f8b669d62a12881747b502d61df2078c3159f374ae2b9539d73e627096843938f4afa5654d13f159abc76f9bc0b19661a72f1180ffbc52acc4cb2f34c696cd3b8fd343d675d4f413b601d62cc2df3390566da4cebea20899e15e214aa605310057251f6f8766cae4bcf3f851823e81d07e12f2009ecad070832a7cb53fabb86a2282e649aa5304e35ac9f927907942a1ce4e72039fb955b5c3105c843495436f4c4217502d4016de7948046ca3fd468bdc5cea45b1d35b59555e3ffa3d6d8bbe6d56b00d775f0b37a03bb636af8") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x7fffffffefff) close(r2) close(r1) 05:52:50 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0xc2ffffff00000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) [ 2204.207412] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2204.235878] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x8, 0x2000) faccessat(r3, &(0x7f00000000c0)='./file0\x00', 0x40, 0x1200) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r2, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x400, 0x4) 05:52:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0xff600000) close(r2) close(r1) 05:52:50 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:50 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x40000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:50 executing program 5: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101002, 0x0) mq_timedreceive(r2, &(0x7f0000000080)=""/81, 0x51, 0x5f3, &(0x7f0000000100)={0x77359400}) 05:52:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x7300) close(r2) close(r1) [ 2204.472304] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2204.508100] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x8, 0x0) openat(r3, &(0x7f0000000080)='./file0\x00', 0x80, 0x1a4) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") kcmp(r2, r2, 0x4, r0, r0) ptrace$cont(0x1f, r2, 0x0, 0x0) 05:52:51 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x8cffffff00000000, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:51 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x600}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setregs(0xffffffffffffffff, r1, 0x94f9, &(0x7f0000000340)="0a3ad071bc9d98d9b6cce3b7fa1fd2acc3749525864786860b7fc378a2d9092843405e9d600595b11f3effc3329e3102e5c6c2b60331f7392626e1c2cea879fad0467d7c2e28bcb0f0127186315ab8134e846283690753d12441c086194ffdb61c78a69ce7ee16e27bfe2f69a9b29799cd21aade47a3939c0ef47f0e4dab9a499e496d6dd8befca4cd2e36b8da5ea034f2c128e2b750548cba17789d9dc109733c4657fb4a206bb561a8691c388921bce543c2666aff12abd60ee2f5b33eb305f76c8d20d18fda3084bad1bf0f9b20e94c16bcbbad22fbe5a0e4") ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80000, 0x0) getsockopt$XDP_MMAP_OFFSETS(r2, 0x11b, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x60) ptrace$setregs(0xf, r1, 0x800000000000000, &(0x7f0000000240)="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") ptrace$cont(0x1f, r1, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000140)={{0xffffffffffffffff, 0x3, 0x6, 0x3, 0x3}, 0x0, 0x8, 'id1\x00', 'timer0\x00', 0x0, 0x1, 0x9, 0x5, 0xe02}) 05:52:51 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x6000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x60ff) close(r2) close(r1) 05:52:51 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x1c02000000000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) [ 2205.135813] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:51 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000140)="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") r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x10000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r2, 0x0, 0x0) [ 2205.180521] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:51 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:51 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x1f90, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0xffffffffff600000) close(r2) close(r1) 05:52:51 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xfffffffffffff000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x400000) close(r2) close(r1) 05:52:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x3f000000, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:52 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x100000000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x70500000000000) close(r2) close(r1) 05:52:52 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x3000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x3, 0x36002) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000180)=0x2, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$UI_SET_FFBIT(r2, 0x4004556b, 0x17) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$RTC_PLL_GET(r3, 0x80207011, &(0x7f0000000100)) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000001c0)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05ccc3c8ff40ddec1ae98648b408a3225b586b3bf21de9c3760ca37fe02d30ea3e29c7135ca201bf2fd6ae237bbd38f3bce67e4ff7ba25832f43399662423048e40c92938a17760b9f712e6012c1a5fc8c6edd2f95ba67a09c2eeb1b92b4ff0") ptrace$cont(0x1f, r1, 0x0, 0x0) ptrace$peek(0x2, r1, &(0x7f0000000040)) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x1) 05:52:54 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x4c00, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x930000000000) close(r2) close(r1) 05:52:54 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:54 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0xf01001fc}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x8cffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) [ 2208.309333] __nla_parse: 6 callbacks suppressed [ 2208.309346] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2208.360127] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:54 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x340, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x80000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:52:54 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x3000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x4000) close(r2) close(r1) [ 2208.518303] QAT: Invalid ioctl [ 2208.529916] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2208.541070] QAT: Invalid ioctl [ 2208.575367] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:54 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:54 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x6800000000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b80)=0x14) sendmmsg(r0, &(0x7f0000002a80)=[{{&(0x7f0000000080)=@ax25={0x3, {"d4d15aa1d2489c"}, 0xd6}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000100)="6a11cd069562d0236650c64d50c51fce2054ed214358f7cd9f9aea7c9b0afe87fb370b44ceb384e2b64e675ea8e63b1543db3086be4977bee93cfa3fa1c67f963a1adb58a860b11c5a79165eb8d91a2ccde68e759b916c43093dc30a8ab10d751171b5c9f9a40bc83f75b5c95b006d343da10821177c104754cb1ce37073f83101cd63c7287d7e43926ce73f18ebec07090c3eb56d07f5ae2b958db260eca003eb6939974d42ed972d534944964ac97d8538920f329d6fd82f49639ae1c2501cc35cf6b1d64078", 0xc7}], 0x1, &(0x7f0000000240)=[{0x60, 0x113, 0x1a, "8838ce21199dc3eb23c2e6a2f87c17ead864d2452315e33e602fa74a32ec5fb660ad4d65ec6e76c6a7921759306f0e24a9337fb545f373afc84b50f13665e511e1af591a19a0fe156773bc15930dc826"}, {0xa8, 0x115, 0x1f, "468557d3459ca95e46687e2746d768f745ee3fce3cb55e1b870c73e78dbea12546adb3a8e54888bbb050382595a90d5960aad6a6dacd4fead73070324fd0951845923a425c8049ddf659d88bb879b52d70b09f3e9dfc0da7bc71fb60acca5884b23ddb4ee4fd3037bd5db4711508d8e84cc9cdf6a461b257117c45fd7099397914d2410abb69bde01d86dc2ee5df4da88cfe"}], 0x108}}, {{&(0x7f0000000bc0)=@can={0x1d, r1}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000000c40)}, {&(0x7f0000000c80)="fddeb7ecd20b9f7f5c22a800237d04ebfb4b15d2bc1e71168de3712063c2ec1a3128eeff3c0e4303ecaf4d01782fc9d4bda6d51aa8c3981736db44a14bbac0c03a48edca850b3713b4480ab56cee0b769d88eab4782eae4ecb1affd19aee85c2ad0c3c4d58904f51d609f5e162ff2b5eb78172f48ff809a1365e8715bbf6e4b6b09c262b61929e8e9684ae951a8bb1d4bc6d4a3035a5ceda3e688811a4bc95d486d0af7e0f4beac99c3aafc731fc55d34f372e53148a49951f383ae7d4ce637dfd714f4deb73481cf7c0cc1fd4b2c119ebe58037bc31c8d194e153413d4f44d8375d7dc5f0", 0xe5}, {&(0x7f0000000d80)="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", 0x1000}, {&(0x7f0000001d80)="3b9b022334ebe46a7baa1e", 0xb}, {&(0x7f0000001dc0)="11fa0cd046bfda03094acc14e62438b882c757d51d9eca26469b0384b734ecf5cc0d4efeaf8ed882f91a379177a2a6c67b8475c8d7dfac3881c71c2b13e8fd16ea675f0e387287a213f096190d1112ef2cf5d2838c1bb9271fe6e6d42879d117706bbf6eb45ef94a0683e6aa4e2d164ca40096a5244240fd9f686be509fb2b4403b5afe055ceebb5e66067b88a25acc61f87649aee74c332a800c08309a2e86f3b742bbe74582033e3d0ff48270a85a76b83966a9f606045e1dc8ec941ac523b3dbde36393f02e46cf64e3c77769676f6f8e4da381c4f224bf1122b14997f8e5237362a6520bbc", 0xe7}, {&(0x7f0000001ec0)="6380df7e7bb7cbbcd7ffab98836359477c56730658ad45db91eaad856d790287ddc6a33d506f780e0db731287f7111bc2188b15639b172e3fabb27aa0b41554a5f0f1d012bc85cc516cfd52a47b3c542ac93426966cdde702dfb59122f238f1987598715", 0x64}], 0x6, &(0x7f00000003c0)=ANY=[@ANYBLOB="20000000000000008f010000010000007a7078c799241c5ddaf1d8f2c8b4000058000000000000000000000030220000dba37400a6e9374c156a859d707ccc4ec37f5667476f04a8fc8c10cd3d8165efe6c86871159e08bb7770dff20c92870caf0a623377d222d9a720279e54723f38f393cc0000000000a00000000000000003010000000000009179dfcea9b968c8ad137df3c77f85c8a015541859b73874cd5d15973186c0fb9485f323d46726b0450b373ae559e6796cdf874e180bf2380a82d5f0476b16bec56c606f5c4186b02fd66db816c2ed1b7a731de9d92cc6bd9de5cb8910ae392f419ab4a019e90a4f66916765b26a4553fd8c57476530e5a23afece5e047d617c0caa2f312d32cfdcd1326abb5b75b2e0e653ae0df900000000000010010000000000001f010000f9ffffffd24889d3f5fa4d49e8d071ce69b872c7fc38cf9db6c3e784208ddc7680e924d93a7d2b864fc8346ae0a77b6c1a16a76d64bcc1dd41654aa9fd946aef933f645d596b080ac48354e0945686ffd57a8305cbfd8efafdfaab33b16df28433dc058e438e9915d485989f78c21f9ee1f92a9407c865887020cb8e1848398ec263f4f11633a2a7d454b356fcb58011415d21937d9dfbcb7534bec72ef4e45770c998b546ac65a4ce3e999fc3584d6032fdbdb2ee5986b10b761e0a4d3cfe258232026b132b9c7a55de4ac04281cda0a42f250d555ad6b32ffe226559c5c2ca33234f2c88a348488c098b0a1de1c4fdec28aae8f8eea6dc7ccaed1fb4bd2e3700000000a0000000000000001e0100000500000006009b6bd167e364e774e15541051e7abf5aa5f2fa7fbff12439e0328bc561ce28d96becec948114ec350093fa5b7a0fe72f22530faf837c754bd5e9bc3754946e39171bc476a800b2da5c1b437e0a62da854ed91939e4f4f47d9297b2175bd49d0ca435a7bb164a746acb2ed372bd6c25e35365939f88e362e11c33eb26e19c97dcdcc890f509d2f89913bf00000000000100000000000000010000010000008257fc2a4ff50edabd82c645d3ddfe478be89bbb8eeecc8c4323b1d8d8b7ec1a747a5f8581d1a5643b9cf0fed8f6f666ee2f46805fdaaa2242f5f39ed99b390615718d3ba486e196afc4831589023705305e482ea5dc95ac4ffc193d2e2de97b792f87666efd2ec2f8e9125835ecb735f6ab80d93f5abd9b42364d8e11feb5e78a2f757455d4581f3328a9f0dac8328e05c93070858f8f7146b82e5f738e7f51c7252209dc1b315923654c895677971bc5ae47bc11d1c66417d6859a1009a6bdbd7cb44e64e119dbc452a8fc43dcc1d8eea5d3fb6330103ecb534aabf61d42d2acabf02d4d2f4e76fedff52ae81bb690e0ef85f295517e9c00000000000000580000000000000011010000000001001ea2fa7450718b9a2b47cb5bd05a662c64a21d8435c9f26a6fcce25263065dc728ddef0bd569b578b3c66131239176de492803a112dbc2299af756cd149f0e674de75a1685072a08980000000000000010010000000800007f76f54bef535aad7b6337040bd8a05256cb6e8bb1096d859eb2132e7633cc13cc6c5b98ad6ba6951eb4f3a999d960f06534b94c848a8d3681e7eaf543a010cf2a3669f46a2bbe7b6c61b4131f8a4739be8d93ac12f4223ec2a2a1f3adc55124a73ae42d832d4e5364bfc6aea73562ee4e9052378a42c9476300c578bbc7b9689ace0000000000006000000000000000ff01000009000000a4352fb88baeef9df19c02c4d0e5d15fd8f4af4527b96117d4af37a4cd25858690adf9ac8f576f206d6f0326bc401e075f31c9e4dfc4b2460b4204d10c40887fe59b8e98a377b849e61c3757fbda59bfc0000000000000001d0100008068000078fc765f7e01a57dff8bf656f801f08380d380f7229e07e40fa37ac29cdbbb7072b4f7924c0f91d2d04330d35f615400e67b10d991b45f8e08b411864ecfbd64005857f01d33706457c00a9914782b6b7ec42c0124b8257a81f325b12d6a541d4b32111f2907cd0664c490deefefb8a66bdee98311a93540210cb93bd2285a1cc37fe6a023f786b81905895a6a4688e78f208990c7a0c59b417e2f87cdf6"], 0x5d8}, 0x8}, {{&(0x7f0000002640)=@ax25={0x3, {"e7e7eb227e1c43"}, 0x3}, 0x80, &(0x7f0000002a00)=[{&(0x7f00000026c0)="1591b00fd9aef075e5eb8936574cf5c5cf31296779c72b2c", 0x18}, {&(0x7f0000002700)="a5ff213bf51c8ddb088e08", 0xb}, {&(0x7f0000002740)="a508a4b98f2367e1e24e6ed68bb8c8e3472828890d060546a031aa379ffefd38f3f877fbf7981d86cbce043d7f353d4b4020937ef523f183bcca4eb06a73d429c93f5d8ef6eac084b67e5eb423a63730278a31eff250798f096726ef3ad8a2fc2d19e568a26b33b247ce68bb25d5aaa87bc613c6944a332c2cff37ff3abd08d28a1d56a0cba8076b195b28b4e028c8e3fac858f8c2a9570ec2b2a3c6bfbecd6a485c263090ec4238d0", 0xa9}, {&(0x7f0000002800)="38ba7c04041fe8d8f55443dd4b2a53d2c3651ae373dbfddfc647f0c2613d7ba879fb585d8df78dd9036ea928f9db0d6041bfe457d5ac2be694cb164699befe633d6eb6238c21ec24a5dd47fc5974", 0x4e}, {&(0x7f0000002880)="c8f0a53aa2c40d99efa3c16fd1431dd2ac2006c35a5949eebfdcf390d2ec5f728e7d98c91987017ebd4c2d0001487fe6d6a3ca5d797e07a9f044acdd3bef72ad825bfa8b5e27f3afbf08d0476e115af26e45e16a51bf4229858264fc6fc744d05bfd320a814ac2f659fb80502550940c8346a8ded791e1de01e93458c4cef3b17bcdab98ff47e6468c6cd233110edb79fc5ae48dfa900b975df517fcec2c6be5b3882a37faaed4089b3a0b6e50bb58d7450c9d27ac5d7f87800a76a935baed59d1cff530709dad04f779fb02c5ab46f77493843891272ff1e571f88f", 0xdc}, {&(0x7f0000002980)="3957eb481533626bc2867f525d3afd191a7c920db2f26fabcd34ef0ecc52d804ec98d9fcac74b10cad36a4e7c2f5b570dfcaf92b914b3fd59467e6b57d9dde", 0x3f}, {&(0x7f00000029c0)="1b8c4d629e395e6ba6c4deb25109a2d7b663718b05183396d3ddde10", 0x1c}], 0x7}}], 0x3, 0x4000000) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x100, 0x0) readlinkat(r4, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)=""/78, 0x4e) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) close(r3) r5 = openat$cgroup_ro(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$KDSKBMETA(r5, 0x4b63, &(0x7f0000000040)=0x7fffffff) close(r2) [ 2208.722626] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2208.743784] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:54 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:54 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x100000000, 0x400) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000040)) close(r2) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x101101) close(r1) [ 2208.985546] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2209.016955] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:55 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0xd01001fc}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0xffffff8c, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:55 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:57 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0xa90, 0x10000, 0x8001, 0xcd4b, 0x5, 0x2, 0x94, 0x4, 0x5, 0x4ca, 0x7, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r2, 0x0, 0x0) 05:52:57 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x5, 0x3f, 0x9, 0x4, 0x3}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000100)={r3, 0x401}, &(0x7f0000000140)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, 0x0, 0x0) close(r5) close(r4) 05:52:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:57 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x6300}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x2000000, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(r1, 0x0, 0xfffffffffffffffd, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x176) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000080)={{0xe, @multicast1, 0x4e24, 0x0, 'none\x00', 0x4, 0x0, 0x4a}, {@dev={0xac, 0x14, 0x14, 0xb}, 0x4e24, 0x1, 0x7, 0x0, 0xb2}}, 0x44) [ 2211.563427] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2211.590773] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:52:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x9, 0x400000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, 0x0, 0x0) close(r4) close(r3) 05:52:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x100000000, 0xfffffffffffffffc) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) clone(0x1000200, &(0x7f0000000040)="668a3932165d1cff4eecf2256790ecde79025a3cfcbe166b70cd57db174880d9647e52f53bfeea13e7955dbbbe512cb25fb5a2f773b2c9cb9bc2041c10a91c913b035f6a712405541850853c69295768abe34b71e4822ce71b508bdd6303b0a461bcd66ccfed778a8f20a91a57cca48a6852e131e32270d171f099a98a54a5877dc1b2ecd8367a3345ebb13e7add2377e33b93de693424dee4b8aaca9621beaddf1ca718c4fba6dfe2f3e605bfeebab05d77b45bfa5d184028", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="b1411f07986800c5231158f6e501b38f204284e7ef53a2fb23b9215c298e37506c0213b9a9bf8f207b2db2849c334cad2bbd11385ce2e85dead5db8bcbb6331380ec417c3e14f6b4ce5b90596e5b977d6d7792fd2a34c97ac512c5110f8b258a6cc585d40aa99b4cc119f981ecbba8977697471672b2b802d77092085134508ac834958d40b8fd905e66ec05662d772831") 05:52:57 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x600, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2211.807646] Unknown ioctl 44698 05:52:57 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0xb0000, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x5, 0x1, 0x7, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pkey_alloc(0x0, 0x2) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r2, 0x0, 0x0) [ 2211.843861] Unknown ioctl 44698 05:52:57 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x7, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:58 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r2) 05:52:58 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x800000000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:58 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0xd010017f00000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:52:58 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:58 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x4c00000000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x40000000, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:52:58 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x700000000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:52:58 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:52:58 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) socketpair(0x10, 0x4, 0x6, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x3, 0x3, 0x591d, 0x1, 0x2, 0xffff, 0x0, 0x1f, 0x45, 0x41b4c3b4, 0x4}, 0xb) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x5, 0x1, 0x6, 0x3f0, 0x200, 0x5, 0x5}, 0x0) 05:53:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x3f, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x80, 0x0) write$selinux_attr(r2, &(0x7f0000000040)='system_u:object_r:tpm_device_t:s0\x00', 0x22) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) connect$bt_l2cap(r2, &(0x7f0000000100)={0x1f, 0x2, {0x1, 0x7, 0x5, 0x1002, 0x2, 0x4}, 0x4, 0x8}, 0xe) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) close(r3) close(r3) 05:53:00 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x200000000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0xfeffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:00 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x300000000000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) [ 2214.990511] __nla_parse: 12 callbacks suppressed [ 2214.990522] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2215.019108] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000040)=0x5, r1, 0x0, 0x0, 0x1}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f00000000c0)="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") ptrace$cont(0x1f, r2, 0x0, 0x0) 05:53:01 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xfffff000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x9, 0x903) connect$vsock_dgram(r2, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @host}, 0x10) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000140)=0x3) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ptrace$cont(0x1f, r1, 0x0, 0x0) 05:53:01 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2215.146927] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2215.173015] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:01 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000080)={0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f00000000c0)={0x9, r1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x29) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r3, 0x0, 0x0) 05:53:01 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x10000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2215.328399] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:01 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2215.397776] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:01 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x81000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2215.547948] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2215.559865] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2215.834038] FAULT_FLAG_ALLOW_RETRY missing 30 [ 2215.845941] CPU: 1 PID: 12379 Comm: syz-executor0 Not tainted 4.20.0-rc5-next-20181207+ #163 [ 2215.854553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2215.863911] Call Trace: [ 2215.866537] dump_stack+0x244/0x39d [ 2215.870191] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2215.875403] ? attach_entity_load_avg+0x860/0x860 [ 2215.880281] handle_userfault.cold.30+0x47/0x62 [ 2215.884974] ? userfaultfd_ioctl+0x5610/0x5610 [ 2215.889567] ? mark_held_locks+0x130/0x130 [ 2215.893808] ? find_held_lock+0x36/0x1c0 [ 2215.897892] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2215.903440] ? check_preemption_disabled+0x48/0x280 [ 2215.908468] ? find_held_lock+0x36/0x1c0 [ 2215.912547] ? userfaultfd_ctx_put+0x830/0x830 [ 2215.917141] ? print_usage_bug+0xc0/0xc0 [ 2215.921225] ? lock_is_held_type+0x210/0x210 [ 2215.925651] ? print_usage_bug+0xc0/0xc0 [ 2215.929726] ? graph_lock+0x270/0x270 [ 2215.933548] ? lock_unpin_lock+0x4a0/0x4a0 [ 2215.937803] ? find_held_lock+0x36/0x1c0 [ 2215.941886] ? __handle_mm_fault+0x4d13/0x5b70 [ 2215.946483] ? lock_downgrade+0x900/0x900 [ 2215.950649] ? kasan_check_read+0x11/0x20 [ 2215.954820] ? do_raw_spin_unlock+0xa7/0x330 [ 2215.959237] ? do_raw_spin_trylock+0x270/0x270 [ 2215.963833] ? fault_dirty_shared_page.isra.87+0x320/0x320 [ 2215.969486] __handle_mm_fault+0x4d20/0x5b70 [ 2215.973914] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2215.978770] ? lock_is_held_type+0x210/0x210 [ 2215.983199] ? __perf_event_task_sched_in+0x2a9/0xb60 [ 2215.988403] ? graph_lock+0x270/0x270 [ 2215.992215] ? get_futex_key+0xfcb/0x21b0 [ 2215.996406] ? graph_lock+0x270/0x270 [ 2216.000215] ? graph_lock+0x270/0x270 [ 2216.004033] ? find_held_lock+0x36/0x1c0 [ 2216.008124] ? handle_mm_fault+0x42a/0xc70 [ 2216.012374] ? lock_downgrade+0x900/0x900 [ 2216.016534] ? check_preemption_disabled+0x48/0x280 [ 2216.021566] ? kasan_check_read+0x11/0x20 [ 2216.025727] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2216.031016] ? rcu_read_unlock_special+0x370/0x370 [ 2216.035960] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2216.041507] ? check_preemption_disabled+0x48/0x280 [ 2216.046542] handle_mm_fault+0x54f/0xc70 [ 2216.050615] ? __handle_mm_fault+0x5b70/0x5b70 [ 2216.055264] ? find_vma+0x34/0x190 [ 2216.058824] __do_page_fault+0x5f6/0xd70 [ 2216.062903] do_page_fault+0xf2/0x7e0 [ 2216.066719] ? vmalloc_sync_all+0x30/0x30 [ 2216.070879] ? error_entry+0x76/0xd0 [ 2216.074618] ? trace_hardirqs_off_caller+0xbb/0x310 [ 2216.079645] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2216.084497] ? trace_hardirqs_on_caller+0x310/0x310 [ 2216.089540] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2216.094399] page_fault+0x1e/0x30 [ 2216.097860] RIP: 0010:__get_user_4+0x21/0x30 [ 2216.102280] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 55 65 48 8b 14 25 40 ee 01 00 48 3b 82 18 14 00 00 73 43 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 25 65 [ 2216.121222] RSP: 0018:ffff888184e774b8 EFLAGS: 00010202 [ 2216.126603] RAX: 0000000020013e98 RBX: 1ffff110309cee9e RCX: ffffc90005a50000 [ 2216.133898] RDX: ffffffffffffffff RSI: ffffffff81b29653 RDI: 0000000000000282 [ 2216.141186] RBP: ffff888184e77cb8 R08: 1ffff110309cee74 R09: 0000000000000008 [ 2216.148462] R10: 0000000000000002 R11: ffff8881d8694640 R12: 0000000000000008 [ 2216.155755] R13: ffff8881c4ae6000 R14: 0000000000000004 R15: dffffc0000000000 [ 2216.163058] ? __might_fault+0x1a3/0x1e0 [ 2216.167202] ? sctp_setsockopt+0x17d7/0x7380 [ 2216.171631] ? sctp_setsockopt_paddr_thresholds+0x560/0x560 [ 2216.177360] ? __lock_acquire+0x62f/0x4c20 [ 2216.181611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2216.187157] ? get_futex_value_locked+0xcb/0xf0 [ 2216.191849] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2216.196902] ? futex_wait_setup+0x266/0x3e0 [ 2216.201248] ? mark_held_locks+0x130/0x130 [ 2216.205497] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 2216.210707] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 2216.215822] ? futex_wait+0x5ec/0xa50 [ 2216.219636] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2216.225191] ? check_preemption_disabled+0x48/0x280 [ 2216.230228] ? debug_smp_processor_id+0x1c/0x20 [ 2216.234928] ? perf_trace_lock+0x14d/0x7a0 [ 2216.239182] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 2216.244387] ? lock_is_held_type+0x210/0x210 [ 2216.248831] ? futex_wake+0x304/0x760 [ 2216.252653] ? graph_lock+0x270/0x270 [ 2216.256470] ? __lock_acquire+0x62f/0x4c20 [ 2216.260737] ? find_held_lock+0x36/0x1c0 [ 2216.264819] ? __fget+0x4aa/0x740 [ 2216.268287] ? lock_downgrade+0x900/0x900 [ 2216.272450] ? check_preemption_disabled+0x48/0x280 [ 2216.277484] ? kasan_check_read+0x11/0x20 [ 2216.281643] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2216.287430] ? rcu_read_unlock_special+0x370/0x370 [ 2216.292384] ? __fget+0x4d1/0x740 [ 2216.295858] ? ksys_dup3+0x680/0x680 [ 2216.299628] ? perf_trace_sched_process_exec+0x860/0x860 [ 2216.305107] ? find_held_lock+0x36/0x1c0 [ 2216.309195] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2216.314740] ? aa_label_sk_perm+0x91/0x100 [ 2216.318999] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 2216.323941] ? aa_sk_perm+0x22b/0x8e0 [ 2216.327779] ? fget_raw+0x20/0x20 [ 2216.331244] ? perf_trace_sched_process_exec+0x860/0x860 [ 2216.336731] ? aa_af_perm+0x5a0/0x5a0 [ 2216.340560] ? aa_sock_opt_perm.isra.13+0xa1/0x130 [ 2216.345504] sock_common_setsockopt+0x9a/0xe0 [ 2216.350015] __sys_setsockopt+0x1ba/0x3c0 [ 2216.354184] ? kernel_accept+0x310/0x310 [ 2216.358262] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2216.362858] ? trace_hardirqs_on+0xbd/0x310 [ 2216.367311] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2216.372705] ? trace_hardirqs_off_caller+0x310/0x310 [ 2216.377822] __x64_sys_setsockopt+0xbe/0x150 [ 2216.382245] do_syscall_64+0x1b9/0x820 [ 2216.386145] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2216.391530] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2216.396487] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2216.401346] ? trace_hardirqs_on_caller+0x310/0x310 [ 2216.406374] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2216.411403] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2216.416435] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2216.421294] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2216.426493] RIP: 0033:0x457659 [ 2216.429702] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2216.448628] RSP: 002b:00007f9213be0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2216.456359] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457659 [ 2216.463633] RDX: 0000000000000008 RSI: 0000000000000084 RDI: 0000000000000007 [ 2216.470925] RBP: 000000000072bf00 R08: 0000000000000004 R09: 0000000000000000 [ 2216.478215] R10: 0000000020013e95 R11: 0000000000000246 R12: 00007f9213be16d4 05:53:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000000)={0x28, 0x2, 0x0, {0x5, 0x6, 0x3f}}, 0x28) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) r3 = fcntl$dupfd(r0, 0x0, r0) write$FUSE_IOCTL(r3, &(0x7f0000000040)={0x20, 0x0, 0xb, {0x1ff, 0x4, 0x81, 0x2}}, 0x20) close(r1) 05:53:02 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:02 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x20000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0xf6ffffff) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:02 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x30750000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) [ 2216.485489] R13: 00000000004cab90 R14: 00000000004d76d8 R15: 00000000ffffffff [ 2216.579092] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2216.601286] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:02 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x700, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:02 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:02 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x442080, 0x0) read$eventfd(r0, &(0x7f0000000040), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x10000080000) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000080)) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) lookup_dcookie(0x7ff, &(0x7f0000000100)=""/187, 0xbb) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) close(r3) close(r2) 05:53:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x100000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:53:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x6c00, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:04 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fcntl$setlease(r0, 0x400, 0x3) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:53:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x3f00) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:04 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x40020000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x300000000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8, 0x40) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000340)=0xe8) r5 = geteuid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r2, &(0x7f00000006c0)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbfc, 0x1000}, 0xc, &(0x7f0000000580)=[{&(0x7f00000000c0)={0x1a8, 0x1c, 0x200, 0x70bd2b, 0x25dfdbfb, "", [@nested={0xf0, 0x6f, [@typed={0x8, 0x2c, @fd=r0}, @generic="e01bebfb8b884765fa27df7d97bcda79872e1b86c7ad2aa971fcf306fdef4ac4b61f36d9d987e1aaf053843822874ff08558e4f86358e4928efdbe3910477972e07541550895bb046f643296d8a951e427720efb6c58af600eb2b30c0de31df99e9dad816b36b1257970bee54ad24f8783f4a36c4a072c18baadca1680a950d8991798bfb6ec555fe6c1b0b5696f52c9b83423b6d11df129cbd34adcfafbad22219236b3e1824f84841dbf9ec65c669e2ca8ced08eb09fd010babbfb25c0ee1bee76e2f337195f5100ffeb807560c6e041ec02", @generic="dec43ae65d9dca6525915caf4059bc"]}, @generic="dcc78ee1cbac0d0be4f702d32647909dcf2c0bf066d0", @typed={0x8, 0x7d, @u32=0x7ff}, @typed={0x8, 0x82, @ipv4=@multicast2}, @typed={0x8, 0x13, @pid=r1}, @typed={0xc, 0x10, @u64=0x5}, @generic="8eacd5f22c03beb36df98ab69287fff495e1ebb092b75f57a3b3e2f3b482766651c6b4efe95e68635df2210177243a0f8cd5f0eb664fdf7ba33673a4a167c6bd4f00acab47bc15e4384fcd6b430bffd2b85d63855e12f51818d97e2620b7a931e584bd45a2c40c25dc6cd93a5b"]}, 0x1a8}, {&(0x7f0000000380)={0x54, 0x1a, 0x810, 0x70bd2a, 0x25dfdbfe, "", [@typed={0x4, 0x60}, @typed={0x8, 0x65, @uid=r3}, @nested={0x18, 0x57, [@typed={0x8, 0x8a, @pid=r1}, @typed={0xc, 0x38, @u64=0x4}]}, @nested={0x20, 0x32, [@typed={0x14, 0xf, @ipv6=@loopback}, @typed={0x8, 0x3f, @uid=r4}]}]}, 0x54}], 0x2, &(0x7f0000000680)=[@cred={0x20, 0x1, 0x2, r1, r5, r6}], 0x20, 0x4000090}, 0x41) ptrace$cont(0x1f, r1, 0x0, 0x0) 05:53:04 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x800) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x9, &(0x7f0000000080)=[{0x3f, 0xffffffff, 0x7, 0x5263}, {0x6, 0x200, 0x717a, 0x9}, {0x800, 0x0, 0x1ff, 0x92ec}, {0x5, 0x8d7, 0xfc7, 0x8c56}, {0x6, 0x100000000, 0x3, 0x5}, {0x4, 0x80000000, 0x2, 0x6}, {0x20, 0x40, 0xa84, 0x2}, {0x1, 0x4, 0x7dca, 0x2}, {0x3, 0xcde5}]}, 0x10) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) close(r3) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x680400, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r4, 0x5387, &(0x7f0000000040)) close(r2) sendmsg$nl_crypto(r4, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xfadc0101cf906b05}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB="f00000001300000327bd7000dbdbdf256670752870636263286165732929000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000008000100080000000800010003000000"], 0xf0}, 0x1, 0x0, 0x0, 0x200000c4}, 0x0) 05:53:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") r2 = semget$private(0x0, 0x0, 0x80) semctl$GETVAL(r2, 0x3, 0xc, &(0x7f0000000040)=""/63) ptrace$cont(0x1f, r1, 0x0, 0x0) 05:53:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf0ffffff00000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:04 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:53:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x6c00000000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair(0x4, 0xa, 0x1, &(0x7f00000000c0)={0xffffffffffffffff}) write$P9_RATTACH(r2, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x40, 0x4, 0x8}}, 0x14) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, r0, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xffffffffffffff5c, 0x181000) getsockopt$inet_sctp_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xb) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, 0x0, 0x527) close(r4) close(r3) 05:53:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x2) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000000, 0x32, r0, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f00000000c0)=0x8) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x38, "dd1456727d56a24428223e5f1c8cd829aaeb5c6fb777293ef4b174cb479142adc7420d9f1aa3decd34a724caee6333903a5692a7f3b73fd3"}, &(0x7f0000000040)=0x40) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000080)={r4, 0x3, 0xffffffff00000000, 0x0, 0x3, 0x1000}, 0x14) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) close(r3) close(r2) 05:53:05 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x4c000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:05 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:05 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x48}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:53:05 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf00, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:05 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x100000000000000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x9, @local, 0x3f}, {0xa, 0x4e24, 0x1, @local, 0x1}, r3, 0x6}}, 0x48) 05:53:07 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x2000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:07 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:53:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x40000000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:07 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x7f0110f0}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) [ 2221.908239] __nla_parse: 14 callbacks suppressed [ 2221.908251] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2221.937109] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x4000000000000000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x24020400) mknod(&(0x7f00000056c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000380), &(0x7f00000001c0)) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_PDEATHSIG(0x1, 0x20) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x3f) getpid() r4 = socket$key(0xf, 0x3, 0x2) io_setup(0x5, &(0x7f0000000080)=0x0) io_submit(r5, 0x1, &(0x7f0000001800)=[&(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000640), 0x28a}]) io_destroy(r5) execve(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0), &(0x7f0000000140)) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0xc) fcntl$setown(r2, 0x8, r6) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) tkill(r1, 0x16) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r7 = userfaultfd(0x0) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r7, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r8, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, 0x0, 0x0) close(r8) close(r7) 05:53:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x2, 0x2000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) write$FUSE_LK(r2, &(0x7f0000000280)={0x28, 0xfffffffffffffffe, 0x8, {{0x80, 0x1, 0x2, r3}}}, 0x28) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f00000002c0)={0x1, 0xfffffffffffffffe, 0x5, 0x20, 0x9, 0x6}) r4 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x29) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") r5 = syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x0, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r5, 0x810c5701, &(0x7f0000000080)) ptrace$cont(0x1f, r4, 0x7f, 0x0) 05:53:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:08 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbffffff00000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2222.103879] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2222.123989] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0xfeffffff) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:08 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2222.277724] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2222.289744] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2222.407558] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2222.421957] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:08 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2222.563036] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2222.594853] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:08 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:08 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x10000000000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0xfffffffffffffffd}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:53:11 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:11 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x3f000000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:11 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0xb010020000000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:11 executing program 5: set_mempolicy(0x0, &(0x7f0000000040)=0x1ff, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x4, 0x800) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0x10001}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000180)={r4, 0xd2cd}, 0x8) 05:53:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x2a8803, 0x0) connect$rds(r2, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:53:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vsock\x00', 0x400000, 0x0) getresuid(&(0x7f0000000480), &(0x7f00000004c0)=0x0, &(0x7f0000000500)) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000600)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000700)=0xe8) mount$fuseblk(&(0x7f0000000340)='/dev/loop0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='fuseblk\x00', 0x20, &(0x7f0000000740)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1e00}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x100}}, {@max_read={'max_read', 0x3d, 0x1}}, {@max_read={'max_read', 0x3d, 0x20}}, {@max_read={'max_read', 0x3d, 0xfff}}, {@max_read={'max_read', 0x3d, 0x1f}}, {@max_read={'max_read', 0x3d, 0x1000}}, {@blksize={'blksize', 0x3d, 0x200}}], [{@measure='measure'}, {@smackfsroot={'smackfsroot', 0x3d, "65746831f7276367726f75705d62646576"}}, {@fsname={'fsname'}}, {@euid_eq={'euid', 0x3d, r5}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@subj_type={'subj_type', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@seclabel='seclabel'}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@obj_type={'obj_type', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@subj_user={'subj_user', 0x3d, 'trusted-eth1self+(ppp1'}}]}}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f000000f000/0x4000)=nil, 0x4000, 0x1, 0x32, r0, 0x0) r6 = userfaultfd(0x0) r7 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x9, 0x400) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @local}}, 0x8, 0xca8, 0x6, 0x3f7, 0xc1}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000000240)={r8, 0x3fcd, 0x7fffffff, 0x40000000000, 0x8, 0xffffffffffffffe0}, &(0x7f0000000280)=0x14) ioctl$UFFDIO_API(r6, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r6, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r9 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r9, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r9, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x1f}, &(0x7f0000000040)=0x8) ioctl$sock_inet_udp_SIOCOUTQ(r7, 0x5411, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r9, 0x84, 0x7b, &(0x7f0000000080)={r10, 0x3242fa2b}, &(0x7f00000000c0)=0x8) setsockopt$IP6T_SO_SET_REPLACE(r9, 0x29, 0x40, 0x0, 0x0) close(r9) ftruncate(r0, 0x6) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz1\x00', {0x1f, 0x9, 0x7, 0x10000}, 0x3f, [0x8, 0x7, 0xff, 0x6, 0x5, 0x80, 0x8, 0x1000, 0x8000, 0x6, 0x4, 0xf943, 0x8, 0x4, 0xffff, 0x5, 0x62c1, 0x9, 0x2, 0x2, 0x5, 0x8, 0x4, 0x2, 0xfffffffffffffffb, 0x0, 0x7ff, 0xff, 0x1, 0x0, 0x7, 0x8, 0xffff, 0x5, 0xd270, 0xffff, 0x80, 0x3, 0xd208, 0xffff, 0x0, 0x2, 0xf965, 0x1, 0x1, 0x4, 0x7fff, 0x80, 0xf6, 0x2, 0xff, 0x0, 0x6, 0x2be, 0x1, 0xcb1, 0x1000, 0x7f, 0x7, 0x80000000, 0x6, 0x4, 0x81, 0x4], [0x3, 0x0, 0x80000000, 0x4, 0xa3e4, 0x9, 0xee, 0x400, 0x1, 0x7, 0x4, 0x6ff, 0x7fff, 0x100000000, 0x9, 0x6, 0x7, 0x2, 0xe35, 0x49, 0x40, 0x2, 0x3, 0x5e, 0x7fffffff, 0x7f, 0x480000000, 0x1, 0x0, 0x80, 0x7ff, 0x3f, 0x7f, 0x2, 0x8, 0x3, 0x7ff, 0xca5, 0x7, 0x5, 0x3, 0x7f, 0x80000001, 0xb7, 0x1, 0xffffffffffffff00, 0x400, 0x0, 0x3, 0x2, 0x1, 0x400, 0x9, 0x5, 0x8, 0x6, 0x3ff, 0x5, 0x8001, 0x7, 0x5d, 0x100000000, 0x7fff, 0x3], [0xffffffff, 0x100, 0x7, 0x20, 0x6, 0x8b5f, 0x1, 0x7f, 0xffffffff00000000, 0x5, 0x20, 0x7ff, 0x10001, 0x5, 0x3, 0x100000001, 0xb9, 0x80, 0x1, 0x8, 0x1f, 0xc870, 0x6, 0x9, 0x66, 0x86d9, 0x8, 0x3, 0x0, 0x200, 0xb013, 0xfffffffffffff801, 0x49c8713b, 0x1, 0x0, 0xfffffffffffffe00, 0xffffffff80000000, 0x3, 0x1f, 0x7, 0x81, 0x1, 0xffffffffffffffff, 0xd28, 0x4, 0x3, 0x71a053b3, 0x6, 0xfffffffffffffffd, 0x101, 0x100, 0x5, 0x3, 0x53b2, 0x9, 0xffffffff00000000, 0x80000000, 0x2, 0x6, 0x0, 0x2, 0x8, 0x400, 0x5c4], [0xfff, 0x31, 0x2, 0xfffffffffffffff8, 0x7fff, 0x214, 0x0, 0x7f, 0x7fff, 0x4, 0x7, 0x2000000000, 0x100000001, 0x6, 0x7fffffff, 0x2886, 0x8, 0x7, 0x5, 0x3dc7, 0x5, 0x4, 0x1f558fa3, 0x2, 0x2, 0xfffffffffffffffd, 0x7fffffff, 0x8, 0x2, 0x0, 0x800, 0xcf, 0xffffffffffffffff, 0x79add646, 0x1, 0x6, 0x7ff, 0x1ff, 0x1000, 0x8, 0xb44a, 0xe504, 0x4, 0x1, 0x4, 0xfffffffffffff000, 0x7, 0x6, 0x1f, 0x8, 0xff, 0xffffffff, 0x873, 0x800, 0x1000, 0x4, 0x1000, 0x200, 0x80, 0x5, 0xe6, 0x9, 0x9, 0x8001]}, 0x45c) close(r6) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r9, 0x84, 0x7b, &(0x7f00000002c0)={r11, 0x400}, 0x8) 05:53:11 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:11 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup(r0) syz_open_procfs(0x0, &(0x7f0000000100)='net/dev_mcast\x00') openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x6, 0x1d) pipe(&(0x7f0000000280)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x2) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000040)="2e766d6e657430238f00", 0x1) r4 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x8, 0x301002) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000000c0)={r0, r4}) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r4, 0x40086425, &(0x7f0000000200)={r5, 0x1}) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r2, 0x0, 0x0) 05:53:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="3358b99f4fb9ef08a5fb3c48423ae6dc9bd04abb518713b9dc4ebbc574671cb013397d0c0e567bd7500ac5a3c4b1bef9f71182e201e0bc264edc7d1950fcfa0e683454753c09f0cac6e237c5bad4c1aa1be0549c54d9457da94922fed74ec9f6324b09809f008a62bd20a413a86487a18f5595805193bb94b80cfe3ac9ecc25478c04148eb12eb74c88bfd327bc68d390a4fc413c13c35c3b86824f7e264b462dc98b732c837a01d912815163af2b48a29db695f352248ab6f3637b62aac3fd8fae842a5b559c153", 0xc8, 0xfffffffffffffff8) keyctl$revoke(0x3, r3) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000200)=0xfffffffffffffffc, 0xffffffffffffffe4) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000180)='fd/4\x00') r6 = getuid() ioctl$TUNSETOWNER(r5, 0x400454cc, r6) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1000002, 0x2010, r0, 0x0) close(r4) close(r2) 05:53:11 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) migrate_pages(r1, 0x0, &(0x7f0000000040)=0x7, &(0x7f0000000080)=0x5) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:53:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x4}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x40000, 0x0) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000080)={0x7f, 0x8067060}) 05:53:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x4000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:12 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x2000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:12 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:12 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x82) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1c000, 0x0) ioctl$TIOCSTI(r3, 0x5412, 0xfffffffffffff428) 05:53:12 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:12 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0xfffffffffffffffc) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40000, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) ioctl$DRM_IOCTL_MODESET_CTL(r3, 0x40086408, &(0x7f0000000280)={0xffff, 0xffffffffffff0001}) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) write$P9_RSTATu(r3, &(0x7f0000000200)={0x74, 0x7d, 0x1, {{0x0, 0x55, 0x5, 0x9, {0x0, 0x0, 0x3}, 0x200000, 0x100, 0xffff, 0x6, 0xa, '/dev/full\x00', 0xa, 'systemGPL&', 0x4, 'eth0', 0xa, '/dev/full\x00'}, 0xa, '/dev/full\x00', r4, r5, r6}}, 0x74) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r3) close(r1) 05:53:12 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000040)=0x6) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:53:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102002003, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10000000002a) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x6, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000080)=0x8, 0x1) ptrace$cont(0x1f, r1, 0x0, 0x0) 05:53:14 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:14 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r0}) getpeername$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x10) close(r3) pipe(&(0x7f00000000c0)) close(r2) 05:53:14 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0xfffffffe) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) [ 2228.655618] __nla_parse: 12 callbacks suppressed [ 2228.655630] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2228.702005] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:14 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbffffff}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x60c081, 0x2) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4208, r2, 0xfffffffffffffffd, 0x20) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000100)) ptrace$cont(0x1f, r2, 0x0, 0x0) 05:53:14 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) ioctl$sock_netdev_private(r2, 0x89fe, &(0x7f0000000080)="138dcddf16091eeabb9d891c6b5955d1debcc839047f30f76254bb7802a1fe12a2c7db598216036f4e5a94e7cf436e7395e56afe2e3238a5a6d41a735a311179279b4afdbdc2c105f2d25b50a19bf479d3a8233971c9bceee1") r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$TIOCLINUX3(r3, 0x541c, &(0x7f0000000040)) close(r2) close(r1) 05:53:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x20200, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000180)=0xad57) sendmsg$nl_netfilter(r3, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000480)={0x10b8, 0x12, 0x5, 0x200, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x1}, [@nested={0x10a4, 0x21, [@typed={0x8, 0x76, @pid=r2}, @typed={0x14, 0x7b, @ipv6=@ipv4={[], [], @rand_addr=0x2}}, @generic="b33de4b71e49147ad45899413b0745c4489aed7552887cb12fa3205f9e2b833dd895ea467f861de606fef8b7cde32317f5202533cbefb17b0834b442ba39a6d586f10b2e370dce2ea9f85ff88fb2aa4b579853863e87883d7e28069e103437dfefbda2d7989ebd6d808656394375420f0bdc262940", @generic="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", @typed={0x4, 0x78}, @typed={0x8, 0x72, @pid=r2}]}]}, 0x10b8}, 0x1, 0x0, 0x0, 0x880}, 0x8080) socket$nl_netfilter(0x10, 0x3, 0xc) ptrace$cont(0x18, r2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000200)=0xffffffffffffff14) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") fcntl$setown(r3, 0x8, r2) setsockopt$IP_VS_SO_SET_EDITDEST(r3, 0x0, 0x489, &(0x7f0000000240)={{0x0, @broadcast, 0x4e23, 0x2, 'lblc\x00', 0x8, 0x1ff, 0x64}, {@rand_addr=0x63b, 0x4e21, 0x0, 0x4, 0x100, 0x10001}}, 0x44) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x7, 0x8de38efa598e1) ptrace$cont(0x1f, r2, 0x0, 0x0) 05:53:14 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2228.887236] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2228.908539] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x80000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) 05:53:15 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:15 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e22, @empty}}, [0xdfe5, 0x0, 0x5d, 0x9, 0x3f, 0x8, 0x14, 0xa0, 0x238b4044, 0x1, 0x86, 0x5, 0xffffffffffffffc8, 0x6, 0x1]}, &(0x7f0000000240)=0x100) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000002c0)={r3, 0x2, 0x5}, &(0x7f0000000300)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) r4 = userfaultfd(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getegid() recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='cmdline\x00') preadv(r5, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r6, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r6, 0x890c, &(0x7f0000000040)={@mcast1, @mcast2, @ipv4={[], [], @empty}, 0xfffffffffffffffe, 0x3, 0x2, 0x100, 0x0, 0x2000000, r7}) close(r6) close(r4) [ 2229.083242] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2229.153346] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:15 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0xbc}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:15 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:15 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x200, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) close(r3) close(r2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e21, 0x1, @remote, 0x54}}, 0x3, 0x7, 0x81, 0x6}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={r4, 0x0, 0x20}, &(0x7f0000000200)=0xc) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000040)={0x402, "8a14d922e3f64bebcf80f0e9c9f4e82136c838d27e2d18d4ba4655e38a01c2e5", 0x6, 0x37231587ab088c6b, 0x2d35c0000000004, 0x7, 0xc, 0x4, 0x5, 0x7}) 05:53:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x3f00000000000000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) [ 2229.510111] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2229.547823] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:53:15 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:15 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2229.700432] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2229.713047] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x8, 0x101400) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x8, 0x13, 0x14, 0x8, "b65eddd802ee14d83037376c119d1932d45308ef2eaaccee49441fb4abb27d53e7fe2bec76f3c24d31afaf90a3c405686272ddc543bef3c02614728aa3dade8c", "ec780635d16cfd6721975e2cc643bdc102a28247ee47bebb2a81d11e5bf18ec7", [0x7fffffff, 0x510]}) 05:53:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0xf6ffffff00000000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1, 0x2) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f00000000c0)=""/162) shutdown(r2, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000200)="6de774c700b89cd9f51ebe275cb4c532915894ffd0ad1fba9734ffd8a463228a1042487457cbd5ebc36517ede9ab88ffe47643f945d2135db71e68e108e584448813f32084a4ce63f3ba77fd61e80d83c03d5304005da6857b3c66df93f0a9d3442e4bcfe6079ca59664d442b812b1710419705d95a67cd680db14fc8b890dd51d93d09ce9e894f236b46c860055d20f8c150a0c04099f3ed19d3d81ce8008e1eaa6ba0c3a3bd0c91bc104434637705786ba7756c8dce8ab59360a6bba20c81c1e208185c3e010cd790a3b5fda9580305953cc11bf9e998e40b25dfc0ec4e22c36656ca5f5fd2c1b9e01ca50fd02c72c15e00b74e34b9ae6d926a83471d7620c") ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) flistxattr(r3, &(0x7f0000000180)=""/99, 0x63) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) close(r3) r4 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) fcntl$getflags(r1, 0x40b) ioctl$RTC_VL_READ(r4, 0x80047013, &(0x7f0000000040)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r1) 05:53:18 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:18 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:18 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x5000000000000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) close(0xffffffffffffffff) close(r1) 05:53:18 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:18 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff00000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x5, 0x2000) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0xfffffffffffffffc) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000003fe8)) r4 = fcntl$dupfd(r1, 0x406, r0) getsockopt$inet6_int(r4, 0x29, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000140)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xcc, &(0x7f0000000180)={{0xa, 0x4e20, 0x9, @mcast2, 0x6}, {0xa, 0x4e20, 0x4, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1d}}, 0x40}, 0x4000000, [0x7ff, 0x2, 0x7, 0x8, 0x59, 0x0, 0x71e, 0x5]}, 0x5c) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(r5) close(r3) 05:53:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x1000000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0xfffffffffffffe4d) close(r2) close(r1) 05:53:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x2, &(0x7f0000ffc000/0x3000)=nil) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000180)=0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) move_pages(r3, 0x1, &(0x7f0000000200)=[&(0x7f0000ffc000/0x3000)=nil], &(0x7f0000000240)=[0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x6) r4 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x29) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x111500, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r5, 0xc0045540, &(0x7f0000000100)=0x1) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000001c0)=r4) ptrace$cont(0x1f, r4, 0x0, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x10800, 0x0) ioctl$RTC_VL_READ(r6, 0x80047013, &(0x7f0000000080)) 05:53:19 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x2, 0x12, r0, 0x800000000000000) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x6, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$KVM_ASSIGN_DEV_IRQ(r3, 0x4040ae70, &(0x7f0000000080)={0x100000000, 0xa69, 0x7fe, 0x2}) 05:53:19 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:19 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x6d6}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) [ 2233.038422] QAT: Invalid ioctl 05:53:19 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2233.079148] QAT: Invalid ioctl 05:53:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$update(0x2, r3, &(0x7f0000000080)="5f934ae2f3a4442b956c16372aafde63c13ca26a8754843c332134ef61a0", 0x1e) close(r2) close(r1) 05:53:19 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0xfffffff6) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:19 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:19 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x141280, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x1, 0x400000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x600, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f00000003c0)={0x4, 0x0, [{0xc0000000, 0x5, 0x0, 0x9, 0xfff}, {0x5, 0xfff, 0x1, 0x493, 0x8}, {0x7, 0x12, 0x6, 0x7fff, 0x1c1fb42e}, {0x0, 0x4, 0x8001, 0x1000, 0x6a}]}) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, 0x0, 0x0) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0xc0, 0x0) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000280)={0x10000, 0x1, 0x80, 0x3f, 0xfff, 0x4}) close(r6) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f0000000140)) close(r0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r9 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x32, 0x200000) bind$pptp(r9, &(0x7f0000000300)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0x15}}}, 0x1e) utimensat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{r7, r8/1000+30000}, {0x0, 0x7530}}, 0x0) timerfd_create(0xb, 0x80800) 05:53:22 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:22 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:22 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0xa001000000000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) ptrace$cont(0x29, r1, 0x7, 0x3) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x48, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x400, 0x0) linkat(r3, &(0x7f00000000c0)='./file0\x00', r4, &(0x7f0000000140)='./file0\x00', 0x1000) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r2, 0x0, 0x0) 05:53:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0xfeffffff00000000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x800000008003) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000080)) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) [ 2236.047294] __nla_parse: 9 callbacks suppressed [ 2236.047307] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x90000, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r2, 0x302, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x2b) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r3, 0x0, 0x0) [ 2236.109452] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:22 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x200000000000000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:22 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) fchdir(r1) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'L-', 0x2}, 0x28, 0x2) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000010000/0x3000)=nil, 0x3000}, 0x80000000001}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080)=0x1, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) close(r3) close(r2) [ 2236.274268] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2236.305456] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x7f, @remote}}, 0x1, 0x6}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000240)={r3, 0xa7, "02043a0de18de807f9d2a179a369fd340df191b5078470eed406fd577e4f948042a15aea912540d17316c7296e952b3cee63723dcf0be9ee41e465096b0b4b67ebfbb0b11666ef79d6079210b34bb7b579721d377253cd9f322ec1e1015196fbd813c4cc5356ca14c59fb00dfb0180d1107d212f26e2f0d97ea4f74e93bd3bcdf8f6ba268c89c7e45fb410d456d37f1f19c6c661c9b13d771bc62df14f1540856206a0cc901938"}, &(0x7f0000000300)=0xaf) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, 0x0, 0xffffffffffffff82) close(r4) close(r1) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x210000, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r5, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), 0xffffffffffffffff, r6}}, 0x18) 05:53:22 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:22 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2236.495393] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2236.525580] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:22 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x2003000000000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/tcp6\x00') accept4$nfc_llcp(r2, &(0x7f0000000040), &(0x7f00000000c0)=0x60, 0x80800) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r3) close(r1) 05:53:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x1000000000000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:22 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000004600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000280)={0x8, 0x8002, 0x3, 0x1a6, 0x0}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000300)={0x0, 0x86, 0x0, 0x5, 0x100000000}, &(0x7f0000000340)=0x18) sendmsg$inet_sctp(r1, &(0x7f0000000380)={&(0x7f0000000080)=@in={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f0000000200)=[{&(0x7f00000000c0)="e3f79cb1b4ac8c639c94510d8124a42d61f8e84530654d17588d4ef5b140a8e80a5349392dda1ff6", 0x28}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="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", 0x1000}, {&(0x7f0000000100)="bfd52b72c178d7fa5d417b2e1b28f38a0eb5d700b635a22b8c5641a50aedd9c99308c5b8a651141ccdd61a137685a5bca7b31ebeaf14fc187e7053764ee71823c0280df64d00691ecb204a32d9d7b75140e2ab3a833ec9eea1c119296c481bfb336e06c14b0ac703b930f980c3e6851c31afe62fda74ba4c11e43a232695255bc18de7799d6b71d5d11c682f324afcad787fe45709c943ff2d262fa6be6419cf44272af9c7013ba25d83cbcbe9baa64ca4420945ca78c09798d46eb13bdbd482be809d15f5d275ea619ecc25db7c5dba13c37ff10891d9712b7c", 0xda}, {&(0x7f0000002480)="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", 0x1000}, {&(0x7f0000003480)="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", 0x1000}], 0x6, &(0x7f0000004480)=ANY=[@ANYBLOB="180000000000000084000000f6ffffffdf0000010000000018000000000000008400000007000000000000000000000018000000000000008400000007000000a81414aa00000000180000000000000084000000070000007f000001000000001800000000000000840000000500000020000000060000002000000000000000840000000200000005000a000100000004000000", @ANYRES32=r2, @ANYBLOB="18000000000000008400000007000000ac1414bb000000003000000000000000840000000100a3496495fdee62a40000ff7f0000b28c000001000000ff01000001000000", @ANYRES32=r3], 0xe0, 0x20008000}, 0x20000000) r4 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', &(0x7f0000004580)='trusted.overlay.opaque\x00', &(0x7f00000045c0)='y\x00', 0x2, 0x0) ptrace$setopts(0x41fd, r4, 0xffffffffffffffff, 0x0) tkill(r4, 0x29) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1d, r4, 0x400, 0x0) 05:53:25 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7, 0x40000) getsockopt$inet6_dccp_buf(r0, 0x21, 0xd, &(0x7f0000000040)=""/111, &(0x7f00000000c0)=0x6f) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000100)={0x6, 0x0, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @loopback}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000002c0)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) r6 = geteuid() mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x6a}}, {@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@nodevmap='nodevmap'}], [{@dont_hash='dont_hash'}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@euid_gt={'euid>', r4}}, {@uid_gt={'uid>', r5}}, {@fowner_lt={'fowner<', r6}}]}}) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) close(r3) close(r2) 05:53:25 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:25 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x2000000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:25 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0xa0010000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) [ 2239.253808] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2239.296525] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:25 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:25 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:53:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(r1, 0x0, 0x20000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x1) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000040)={'syz_tun\x00', 0x5}) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 2239.452893] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2239.482255] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:25 executing program 5: socketpair$unix(0x1, 0xfffffffffffffffd, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0xd8, &(0x7f00000000c0)=""/81) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() getpid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x29) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r3, 0x0, 0x0) 05:53:25 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:25 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x29) ptrace$cont(0x20, r1, 0x5, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 05:53:25 executing program 0: socketpair$unix(0x1, 0xfffffffffffffffd, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x3}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x608841, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000140)=0x1) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x81}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x5, 0x3, [0x101, 0xfffffffffffffff7, 0x9]}, 0xe) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:53:25 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x8cffffff) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:26 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0xbc000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r1, 0x29) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x240, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000100)={0xff, 0x0, 0x10000, 0xd3}) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f0000000140)={0x9, r3}) 05:53:26 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) personality(0x200000) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x400000, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = userfaultfd(0x800) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000080)={0x2, 0x20006, 0x5, 0x4}, 0x6) close(r3) close(r2) 05:53:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:26 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, 0x0) lsetxattr$security_selinux(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) 05:53:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:26 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x30, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa, 0x7d}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) signalfd(r1, &(0x7f0000000000)={0x1}, 0x8) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x189) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x800, 0x0) openat$cgroup_int(r3, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) close(r2) close(r1) ioctl$EVIOCSABS20(r3, 0x401845e0, &(0x7f00000000c0)={0x380e94ac, 0x9, 0x8731, 0x5, 0x100000000, 0xfff}) 05:53:26 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, 0x0) lsetxattr$security_selinux(&(0x7f00000003c0)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) 05:53:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0xffffff8c) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:27 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x9ac42000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$KVM_GET_SREGS(r2, 0x8138ae83, &(0x7f0000000240)) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@mcast2, @in=@empty, 0x4e22, 0x5, 0x4e22, 0x80000000, 0xa, 0x20, 0x20, 0x0, r3, r4}, {0x7, 0x0, 0x20, 0x5, 0xd20, 0x7ff, 0x9, 0x2}, {0x3, 0x100, 0x5}, 0x2, 0x0, 0x1, 0x1, 0x3, 0x3}, {{@in=@multicast1, 0x4d5, 0x2b}, 0x2, @in=@dev={0xac, 0x14, 0x14, 0x9}, 0x0, 0x7, 0x1, 0xffffffffffffff01, 0x100, 0x2, 0x100000000}}, 0xe8) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, 0x0, 0x0) close(r5) close(r0) 05:53:27 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clock_gettime(0x2, &(0x7f0000000280)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f00000002c0)={0x0, r2+30000000}, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x40000000, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) accept4(r0, 0x0, 0x0, 0x0) tkill(r1, 0x20) 05:53:27 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2241.063099] audit: type=1326 audit(1544334807.126:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13061 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ba code=0xffff0000 [ 2241.067409] __nla_parse: 11 callbacks suppressed [ 2241.067420] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:27 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:27 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2241.291673] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2241.303485] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:27 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:27 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2241.486324] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2241.504017] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:27 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:27 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2241.665907] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2241.696074] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2241.859501] audit: type=1326 audit(1544334807.926:86): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13070 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4ba code=0xffff0000 05:53:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x8cffffff00000000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:28 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0xe803}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:28 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:28 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:28 executing program 5: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7, 0xd9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 05:53:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_buf(r0, 0x0, 0x2b, &(0x7f00000003c0)="be8a7359b652f506fa1f336f54d8ddfbfc9acdb75b30e4c26cb49e04db1efb0c85c99b156dc7c8541a4d8756b07a9868173b1d89968e8cd8b215611364c015db850487d364f60fd349b6c8c8f95f91206c3958c0fbd90d8d738165a04e57ba120c22cc3f308fedf282c891497fff7c2c5463408ce8a9c443f88f3a5587f54810bcadeebab2335b1c768dc4147f87e0387420a68554d62127527dfd8d6c6ff9af654faec383ce0157171d9c0d21734949a823b6515f3c05ebd4ce4cbaea3260a2fbc8cc51100d49e895cccd1f10d83986cb019f13f19adc4b58397b41401ce95641d9fc76260c38b1392e3ba0204559ef2b95e2870a64557b31ad87d58f4d9af79962529d42c86cb9d6beb003b459026e01047b4ea36b419e46c21aa0278f9712b42bf1ed48b6c30e6633fe93de5ff79a3258db83b9101dee57c001f1f1800292ca6f6eb9da44ee4e0b10086b6b8ff395c50e1937c984465a2926ebf525c80163a3b8b3a2ee265a845d34ba132c8b47824d0e434fe2444b5d204347813644231a0087db2f32de9065d38db38e28af6b1175d4398f4713307a925167b96e4031925640e2f10b4c0ed283dc68415b18037f5ac9f6d24a4a52fb6106b2a425f93916c35a3016f995086fb936db38a9297922963b133a5555cc46988b4f739d1643a0e81dc41bb1ffb560a0d18c4a1af74bd48836dc16660aa93cd86e889ddc1d3bb59ec557ac0887dbcf73d4db1b4bbac93debfc4ce068bdcb345d6945eb27fb88b56b442a924cd947461a4f3c66d7f449dc39ca3cbfd1426d67b381e2a0153cc0e61bc6ceed6dc2121623d0f942200a62a4126081064756b1d0ce935010a877b8b2203868cf8abf8a40795c963fcd03c4fefe70700fd3d3e9c639fb3895322798cd4ce924b016aa9866aba89af8fccead3a551e1172bebeb6427a34a0184e3e8af116fda89d8657e679315a1a611800619ecbae01ddca19da8153e87cb698152b10a126092661383cd5c4f35031a4a1258d7904e618bfbed800fef38c632df23936cf85f5c66eb07142d45c9fcffa7e4fb7c18fa219f1d22708de9e5ef9b913a7b02336f960e56761c05a747baa112667e4d95516b6e80d73af9dbf8ec64dac5dc506b74d5ceeb1a661012b8856c3608154b60b571b2d2925a08096907c82c04b8bb5354062cc09f4a796ee2103e66e2cec7cfe4dd951c23e44c4aaa58990ba02fc0664fdc3cfb310878e7e96056aaae5b9b69b870b3bcb5ed10393fdbdce64157929ef5eb9c596e14ffa388f17f429c2ca25286dddc03498ef27ac998b78fe6077aac4d7ecb7ad0dc253829f0ca741d450ff2f357122cdb10fa01c50402a1a6304567e51ef04259d37b60efca942e098781fe476eb6bac965d180c748676c7bc2615553318f74f23ab8db281b4129904af0a09153cd99e2b03943c150d102b10a5f8a381ad66ffa4aae446dfb911bd93017a190844aa3763c3c70c18a0a44a3c2b3e0a6c0f4cf07d2ce679f737efc7cef3001af2a3b1baf83eec519e266c07016a717b26091ae38ac6710ce1ab74cd94d3c1924ca66d7546cc151e8cfe202124cab1d4aa55612d91b118a0c6f14359f8eef9524565819ae86ef1d46abe00f26051fee02ed4e5821279203ffad4b218414f4366af2ffb33fe94d1dcd8a453b510de91f416daa0d34bbbc020efb996dba273d82ccb1f42687ddb55a393478460f3f48968ffbf30ac0e2b6c365c1d43ee186174c78e24c2eeecd733eea32fd1daade46244958d9603124105b30471542302124427c8f2d7ae929de02ecbcff39d8a1aacb2a69b93c0185c5eae9e2d0d71c9dc54fa814cc74081f89361fd78cf3dce3427843f6a7ce70c27b6173ebd41c9d8b62f24232ccd24f07c1f72dc252929fd9e79f5e0605323fdcd9a8b2099a4bbbec2fa139418db41eb6864d0059abf1b7eb70abbf2310ece35a14190c99d248805fe20c78a9263d4dd2f70a666149da11effa646af331727fbe99a792a2e1e8246175c55fb5cfd0b23920fb1bc7c94fea3f78483c87b39efda9483f3dfbe137fa18ddcdecd689cde17106666a97f7499d8a9d7d6f09bd253f00b5aeca9fdf2691aaa9010743a8b8e7e11be69f42b8259674251d28053baa43ee60fc206985893a5d20ccf2156c12ff339ee9f3f7c6fb59badd61c137f9fe570e5207f3a7211c7ed8a4ae224c86844cfb878afefc8477175205ba5ea8671657837068f0a405867b5ed199d70ab17124425342b9db485fef0ed0c623d1a7bf1d07e2ea127eebe2dd908a78e31bafe7e279209af9930c5b561b7667bc0fa1880ebd0ae448a1758521cf9d113ff9d697292fdad59316de861b343088cd7d783e000c3a868dd56db6c951e1998e961ee0f66e83a39a0973520edb792835f163f87d1959ef05c304a29d1648ad12a35f080bcf0b210f100e0374a526187342e952e8f2fb02c57edd86d88d1fc1c3c7136bbc1e1dfc5aaaaf052ba188abfe459bd9d089f50b83ea643c4a8aba800027b86b9390fc3e7675a4e697136c622a9c12a0cebb35add59d658122973d9a23b56e81cc1c689b3c7bed305bb76f24aa15475766f3ceed5cc32b760d2eae8e9c9ad745d3cac26aabedb1a064c1831ae2b07ae29544ad8389cf2d787103414d55515c90e8fb0acf9701a8c494885bb4e29c57b17da8640a8dda7a18f91b5b1e8c7883b99787e31acbc5a542786447d117d7c84759a4814ec177336c017e2682bb8a5fb735c1f36848d077fd90a0e14faf83d84ecdc00745bd24552f4e2e7ca269b3a582af03566a48b1b4bc9e1db207c0339042621fd817cae1689e6356b1aec1a9702725d00d61740f58ef76c2e18ab50539932a55b5b0af3c92c3669176e861be264e13017500c35d3a4e6bb2d2f717c3c6b614dbc02a2a67ad9eff64e15948a46a0411c521a035dcd6f30bb0049c93d0ea9d8281bb232b1ba28edaf4c8766852ce3f4872ea6e3004f8c1fa224bc683c8451b3444b6e2c43176fc0d859e75305ec36a26342ea18b50ca87334e6512854f4fa3af4af30e76c81e179d39367df1792094acf53352f71251817b0ec5b9b6e39edb3d07f0e3bec15c20a15a0e1eebc948fc99bce74b1a09c7126ae2445a5463496ccf18bc05e734c3558e1b19c45b5f7bbac7ee6b00d8b98fab4ab49628b21b3bb44fa9e7af0bce46e67c2b2ef1f1a6cab9623cf57b2e996773c293ef8f2c39d7703360669b36e1c61241585c6010c3e63ff1ae094fba129e91aeefc9acd9d5a6a3676cf08ad3c80fc764b45fe59a66cbc285100ccf3a386b1244257d64ac320753071cd7e71f1363af701b81c853b73ca6aba08e05cdda10de3063a0b6cc043caeb93d7e7e48a431334ca4a25bfe3c33d8ac20733d5869180e0f79f7c91152ff82255bd2043ee0d1ed1e60e898c7e3d11bb007d63f8a63f869df0c6dd09348c097987be2902622885eb0198d52448e396295ff62acd17061b0e22474f0df56bbee314740610a47824815bc3f99abb0f43257d9e85317900957dde9dffc60a300e9632bf8e8eb52d278b695c312a135c4d34c32b4a364a110bf4ab40c46c9c9fe246df38bb6e2620578f1f9269b097bf11d4236c8af6bbedf56c322980bf3f912b3f008e3b6741f41dcb01b8223608f5855a6cdc7394c98749de526bc20292ab93de25d37c7a0a2c6ce78f5d44f1e1c692d33047e4bf677f2da72619646dd9d5a66fc61513d42509d877fb74c0274e2524fa03e4e41cb82e2acf62fabba1fb4f258b46c4aad9506081772f0c3406d8b571157470c17e115e3ddad130d8c69b27163ad7b3b015b2ce2d36ea782d6235188091a82da12951ee482810be0012a99996db74ce236de486c7f4670a9a54f92c0d2126fe8cbb1d4ceb5868aceb4e8fb64937d5ad85f1b35a796910467c1659147bddea67ef00b3ce45d878c4f7a063010f1db3d267364b0d1c20948d2e80012b687d1453ea5c0b984705b36538b0e52e8b035fe4cafe43f046d71dcf6f35b6fb3da926b09cc7ff3ca8c815644443eac33a80f9e6cd307837ef0c91418bdd6e3e41b7ae7c866511816996258750078f59c9c8d999fb52dbc9a3432dec1b71ac3cd4c04f5b11b4fd0f23c67396425e81b95b9bc90c91209db4a575146053620eb877778b13b84e5f0285c4cf0656f7274de5e2e2f3e1b2b44c553f93eeb6133a6592d043b8108db6bfb23370f6e4eea5000414698f122b6d65231373357ee4d6e72459e2a8a3a9ff6567be94e39caf84f24e63df47427ac83b1ed267f139698ba0724ab539a52b313af86a30ee4fb0a3628e029c146a512839b946704de94084fa2a6e14dd9f7e3d661b3f67e39a24ebbf0e7cf11b648ed42f19a2c8ac00f3bf285408a1e41543fed96e25741d957a65c5926f69b53e51f527c71224468f589f37f7fdac441c1841832c9a4d55ad277c508421ef6aebac85681189288f38e7c7a02dec356490b640d135d66dadab5a02d77cd54f8bc252a81adb257f96cc4a540713c8773da05ba8e793f7e1d763e60da1979d4a078dc37bcce9152113f738bdb921162ac7b24931e1f37b58f75b8fe8e0d458e5568c36978f36ada8311d3314cafa07f84dacca5a9734850d2fd67934fb726b1e8d81f40a80dc96cac8ea7465f507c2d3a0c553d80616ef023fb8d591a1db49fd664e58fa5f70e2e25e5185c824f336303d3dbb407161c905716093da1ad59f3d384b8404045b834901389350f8e1357b7dd681dbc088824fb4fb8faa095f2ab627d6c99e78427e6cf134ee8fe0a27cd758b5f2203a0040d71ce6f259af54abcf137a68255ea4c1287bd6ae53e5cd9974d9c7f644cc6ec4ee613f1e1652a38dd00063d4a787a953a5dde262554081a285ec52c28f51e3f08ac4dab60d8e870dae456d189297f324396db4d1254f59461ad06d9f44e4630f9c711b86918782fab0251a8e12d5252068746807cbbda124b3f70a8a45bb55aa43ea8f9fec7065c3138a6d497fff0d49e66191e432ab72fd7ed6dbe1f68f44ab9d21c011c24ad8eab5b552799f2e45a9deb852f33b23711e020ef30517ac92e1d8c74cf785cd385cc64269aa216384d4fe8356367afe74b847e1e24aea6cc3ef67e5b1bc869e5cc07cbdf79fbdf992ef74891d86301c5315635b52070397e3736dbba1d8501ee33f9041a9de2bd981708dc15d6bed841e69886f92b8cf419d0ba5c29fc16e6161bfb4d9689b265e6f3771ef54ff466b5b4571e64361ad15ac1d713b574827e7b0ea58c43e47ea57630737191d79ed058c3351cb5daf9cbf314079e6953022aa7048b0057df207556e8b9ed559e227bf73b75f41dc5b6048ac92cd14cf6bdf4792f0af764ab3a420e1d5401034e4a60038dd00b4e5153112f7ef2149489f86c948bc050c9956aedfa466bf945a7ecbe36102b168fe845b93aa9ea13a473bd3107c57748e448b944e5a3a12f6fa60c180d431a9730dc34156e89103d5fd8a31ec6a9245c9d5eccbc6038eb8525917b28d612f604111d0a6d3e9942e2d5eaf280b65517bb1b44d66747ac5d1be416afc4455137dcefdea4f8da386e2ee543785c2245ba1d4f397bd2ac4e60ddd56f0ba4f96dd3c8b5a435baee1beeb6c7efe09a696116c48afe2daf094180ea52ae729ca6488420db65e82ea973a241e0c762942b05c47cb33820d408059bc4f95e816ef43e52278fcc1bf751a5deddef37035cb4d43b7c21583e2099b526fb07624ac60e918dd0238d90487116b991ac642732d0de6226ecc78ad2537305cd61a6deedf0f628d72abde3b11ef41d7da", 0x1000) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000080)={0x4007, 0x3, 0x1, 0x5, 0x1, 0x7ff, 0xfffffffffffffffd, 0x80000000, 0x0}, &(0x7f0000000200)=0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000240)={r3, 0x3663}, &(0x7f0000000280)=0xfeb2) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x2, 0x0) ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0x1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r4, 0xc0105303, &(0x7f0000000000)={0x2, 0x9, 0x8}) r5 = shmget(0x3, 0x2000, 0x80, &(0x7f0000011000/0x2000)=nil) shmctl$IPC_RMID(r5, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x7f}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000180)={r6}, &(0x7f00000001c0)=0x8) 05:53:28 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000480)='/dev/snd/seq\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$alg(0x26, 0x5, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f00000000c0)={0xffff, 0x3}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0xfffffffe, 0x1107, 0x2000000, 0x0, 0x1000000000000, 0x0, 0x6]}}) read(r3, &(0x7f0000000340)=""/251, 0xfb) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x5, 0x500}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000200)={@mcast1, 0x0, 0x0, 0x0, 0x5, 0xc3de, 0x10000000101, 0x1}, &(0x7f0000000180)=0xfffffffffffffc32) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil}) socket$inet6(0xa, 0x80000, 0x20) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000005c0)=ANY=[@ANYBLOB="00100000e7dd524cad8764dad0070f83b8c83ec79573a323c94f5795ce1860eeffc7243507faece20550896a5debe185cc973dad0499ef9e09045d14523a7eaa7c57e29cb6c8dfcc89d3835c3d15a78dca3428f1374551ee9ca25e30b0a7bdc9a377b55fcfdef48d7b5cb781348f9648074ed495fdc0e19fc7beb7dbebbeeed0276672ef42a01d9564d2a62edead38151ff7b89dd018ddcc24074014af03a330bb57ceec998e67292fa621994a25d7ae94c5395167cac40725b0f39f2eeaaa3ccbf3c72556bcfd9ba018d3f5be00aa864e6afe693260fcc448de41e7ce33f26e5d1965cdfe771a97535f1a832f9e3d981a3d9ed27d702a036298424a14a0514f621cd068f8d8aa0602cd14a70edb3b41b52a5e21804f642346f703f2e44a62f3e3d39f0c2a515d5b59ef34c6ade1bd8993b9f9f359bbb7dad0b0e106feb526cde5768e61e9fdadeeae0af647199ea8a5963704ff7879e5ebaf314a432db1b24048aea70f0f909b4cd91594ac072fbe1f4e8dcc6a572b4da0eddfa77ba9bbfe293058a05fda52cad55cbeb4e3a40465036bc32258088d244fa252ff1ac601f3168df472d923b6b96477e81ba0f1b99dd47a976de826758ad22862d0adbdd1bf45d04a52733f2497baab493dc224b1c08dcce3aaed45ca64cf02fdea605837d8b9a6dcda60c3caf2bb0ef5009d924e7c7a4344bb341b202390fc8f0ff0bcce85219beded647651c4133a1f25923aca523c239124cbe7297532b2dfca901f107f6fafa7c6a6d9f9a103c9b77a448686bd80fc90b3caa9390ba7b7a14d7b0a0ca38fc56f9e3e29a0f3781074da74f4d317efb32198948e47cfb4d80ef8e88ff95968291200ecdccbc69272130c1b4a3c346a0986753d83b2b3649b30ab62c5681ebde672c3d364440e52f1774905678b40cbc16d06a5f8c9f1d4d9bad2071d23afe25b4d5fd921e85aae2325af3d306d8fbd4bb6e5a91f75a45507d619cc47ae82414b30f63cc71b03052fe0e4053c5319c794a4e0503321c45f79632428801382e7f43fd2ec8e625fc8a1a92bc90d914df7b05f79aa79a09616c34f0aafa1367e37d2123055c2824a52361d285a15937d1ae6d53e542e3a59e9c42ebe537ce5061d30eab67b88e5c5154a85d58891ca97cedaae10f907d5bee9e20a9f487778f41a9a615db141c3d05f06d1247c1a48a5bdcd64421caf53a3561152bfef154522790c838a906d394ed281edb607c3cb3b0e938834803c41ee0c8a7606f166ad30173da8939f8ee00d0d53d0f7584382f1b177e0661d8e1c1ede02d37d47ba8e5826414fcfefa2a6b8a001eca5c5c945195f4cd85306d409df6d68ddeee2aed86bf3c6f439bac27d6a9b8220fc06ced0cf189a4e6814bbf1e4d65c8dc03b7d491f3503baa2fef6211d2e46c92ce616eeaa1797db7ab2b2011ba1c3f2ca00a8dbeb22389d6132050dfedfeffb693e0af9ce3ffa56cb4c5572b407cbe62cd4d84d6439487d79c5f5043201f0e3053d73d301dad7fb45ecb5c71335e52ebf69833dabb40fd4c3f991ccdfe2a83296f4f3385e559578d16454cdee16c1e04b9f6a40abbac8b86d7367de7636e5faba6782460b304e72b9e26b00b24b7dd518433beab55a2e0d7add44b7c404bb8c77232d2ca7f1733cd99988c4aea04b0265e611b721161e8fbd82952f53dd48721ad17d0b47d9e45d37725a91afd7b891e5fe2ef258194c29a31999471cec89b319234db85fe13049a6ed1f5dae16fe47881ac4b54392ecff927667ad682edcc41901063fb726dafb8494d2d0dbef3563ecdcc8713b09f0b9c4d460d527cbdff45f5abef392d1cc581305870de417ac37aaeb80552ac57bc271ce518453990d073a459c6df244897c9f3e246e67572970f688246712d4c7655ea5b557703ffef3bf0d61349c355f88745a10551ce9924968152cc54a8faa58fb1bb78beb1770d673c9ba5115e90ff6f3c75d2c0c358961dfc184b230c1abd6577ef8b68688d30fa0af111599c65436e338c726c2644d33046c3ec78d05a2b4ffa9f98e96d21d654b0aa4de1c6332cee360d8a68112cd5db83d4b898fd16a51968545db7e65de7b5c200dc27b8c9a886a922623bd23ddf0604a3b8b61f281be2ab4fa732ea66e42ca7acb3b96a9af7b1cb1556980e67697527127478e86157ca13c34b1a0dddbdb29b521e1d188e244bf98dd404390a8cdd60e322ae658c60513d583f2a96637a83d79bc4f6dc513e4d62dc0365bb026ce42b78fbca2f5ff2b7b955f419dae2056570d76cf7eaaaf411811a7d1f83431c9f468e84d57d5c3c1ba79680e340ce5fb88730ffb0445e576a4508e6b93b6fe9dab4c161e8a5e6789bce8cb8f2efc198f9f5394868d08bdf1c30d460beb6cb6937823ecbdcaa89a17307405a6096b97e427f8a49d1d237e74195477e7a557b36805b54a4f99e41ca0414b3e4fdd660c87c43a8356bade4324340186f827fc3bf7bf970bc21caa9a1466af4aeb2779af54148e76e37cd42e5a58b279a91379a8d329db31ed51b5396dfdb1e0a847c8599068d07d6e2173e44ceffccee388586fc1d957a879fb1db2855d58dffa2ccc43c2f124c6910b16a16cf332333108a7aec0c2012f00e15ac4a65b3dda296437743fcf49f646e27cf184bf4d653b31d2110c321f7fb2d86f64741678e6ce9dd8289124b35b7a1e232ed6c642864c26e0438fe708c839c080075744f6d4e204a0bd38e247b9096313db06c7e05733e7586d1017c3baa75a546e1c967964b74aea6076a0d95889e22a310f7240c921909bb500f954bdef2dc77b7990d0df62ff162d2632bf066039a8db0f679e774b8467c8ec4949edb41866b59ba32cb70c80fa0bdba6d0ada58970e07e4c2dd60c5075acb4c1535504e81e882e0451410f7b31dff4ddcdba4d5083831ccdd65761bb152611ceb45a0d408cc57ad234d74c4966d4cbe1e619230696a51d17847c9d1d09bda30c2caf27838dd5cc21eda561d876e9783a8e3dc5aa91d5e157b0a75b0fdacec7b1f69085cdf7f993c1f4ff05190dad3ac15401503abbb3230cf3b92a5f45a5ff9f56de42d3e42941ab4a352fb35e898108a45736fed364dd85052c2f932b6f00ef71035bfe633f569c2722f4e107aec41d8e9239520996862d3d4b5deb7cb454de8926b05fa5ebec88da4ffe2d75973d73094fc134133d20ca1e3c7318fdb3d97249de91bfa03298f7322ea5489df6673fddcf7abcd65779a8e938a379368d83ff938e774e248810f251d4df78e759d4ac65f072286793a2827b39e6662e9ae4a9281d54326c23c4670c2534c8c89deb4c520b14eb83b0f97c582cfe49845d9363eda936cda1aa0ccc6170a316cd5ed131830f2bfbb2e72d7e9b96b9db814a12546c7b8e7ae3fed2923759ef24686b37982f65b2f9b144e88f8fd8875e88ce87926acdfd6eed40117ceceee5f7a208972365e8ea5974511c74de7c3ed7611e4b8238a43990c379bf1b602e9167076b3e49e6b8e5d8efe8ffa4026253c7f314e1e49c406ba8b67eacff140ce835140dd8083a0444d38d7cb22e0f2675df71047e463b420f413b6a82179f014113d63595202c5242a49afa8529cf2bf2eef20da0828ed9ad2e5d571d70a27f33fa50bc73657b2de853286a541d3aa4e0237361de38fc9455cca4b08956fd0e7c8b63df58aa9c91b4e6343a07237aa01f54263365acf9545f0464119233a7ad1ff739a36ec019c3821f248787f84a84e0ec7ec0aa12ebba7528e00fbacc12fdffcca9ea9915044a7a3aebf23ca53ebf2c171c67dc21ed3254b06eac8dd493140a5895f98a0cefb44615c3d38d6c772e40730a1a4054b5c0da59d9bffd4ecb65a4d170c2bb3d6b35cf1d35da6c86ddd182a9f3a3077c60742ed635e5ed7b265cda8ba0b83e6b2edb13ac2fe67cd729fdcf28fc643ed9d468f20d239d7240e3a618ef8744cf946d83d62507248750a6e3f142219b43471dac7acb9cbe33d73366b1202c3d6b8cff432d8bb783077c168d6bbbd5a0bba1da126b5b5c772c883078c4ab42afd4f736af6dc815834149f72fa673bd9184a04892f9f3c304b4a5fad219c83d5ed7dee387d85f98f288e0572fbe12490e82e6a872972f8515faaf5fde276267b8a61141859f1f50fe63ec3836c267d9cf1f61dda135c78cf7072729efb8a870496625a64bc6b89d18e25a763d20d7ba069da0da4d857898d3fe881e5e5cbf0ea1d41bd5ffd32fc5544e7831ca383608cab2dfa6d76d684c9a8c653722ba1239cb2a66052ffcc04003e25b68676d57778f9d350e3673371217d0d64b7a1a430778a2153bf3b37445c7d703035d66344fb6d5369cd9c1200cc00960408ee2954584ef0a3a318d5e67dd2adc8eb212b0343826a1a00c1c35c5bbc8db09933f9acbfb159a12df91b1979e876dc49bfbdc4a43f1e8cd6b458df467c5e6e39d291fc224a78256f6a025ee492e84daecc10cd6dee166b890b535b6b5632b608a2a0fcfbc73fe1490c6c09ada33355440019ac446f0a2a5965144cfda5560fab4c126463279bbf391876a01941b82c84943dfdcd5f65f7905502ac9204b890896345a7a29c7b6645d6caaff20cb490dfe4adb7fb9b4bfd64b27b43f7f2160763197e120a1dfb6292111595a8940cb246439d77915ed18985adf6a6ccdd8756f72c00350019b8ce9544b360a9f8447058cee245e47cd57d6164c8d344316a369a82ed6f60bf3416c6bf6f7fa7846e732c338d6384d01507f6807c34455585139693db36873a4547db4b94b1c4193f1d8d8bb3bfe0ad5ea0204edb54f09df6a14dc8b832019d85e6ca4914db17cb86cc9d4e04abb056bc42ed0c13de3212162eaa00ded4a416be0a9e61b6db8be3179b8cb46ff2237c66364ad18eb434a993d2652135e67c711234c90a1287fb8cbd2c14dec854b6fb5581555e211813eb4b4d9e75264e81c5211a3b9c7a97e69fd107028fb8cf2bffad02b283461b29326caf544756a78b2a36c5996389970b03f03bc575fe89e5062b16abbdd0caa20df3a93645e127d824f284eb38f4a7b0aeda276da6fcce40a0928a2a6614cfcc63262a356aa4612e282bb486da1df37a1a8ea9a18d9d4439287de7e09ecd571a163b3067f7b2948c626b0c1b9a7c0b44206a8b28af0eccc63ec18de6cf31cc2b4a02011ddb679327c260ce3c87a10da39f55074372ec49d0ebbdcf9faac6a25cfaa0fa6f6bc2e291a0dfeaf14fd50412670e30cedc61ce12981993b0cf76612fbc524702da33083c1bf3327ffa9f536873b820b9298a153cf8df707e9b9c1eaa35f4d28b7ee1173949d39470216eee7601f1a6c6a9d871b9d7f7d712ee3d6783bdcfb2401efbb26ccf22f246b29cf25f884c9708c96ba3a530703670e585fdfa22afbf74edfc9e9326be579b3ffbde880163fb498b489dcadced831e5e8eac4a4d1a306d34719cc04d55335a1f03dccb57af138ee7e5e859103e331790483ffd9805f14bc2a332fcdd35303e243c34f868e7b4c605fe696159e9c1f3479aa11b6de939207d627f6"], 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000300)=@sack_info={0x0, 0x5, 0x4}, &(0x7f00000002c0)=0xc) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) r4 = shmget$private(0x0, 0x2000, 0xc1, &(0x7f0000ffa000/0x2000)=nil) shmctl$SHM_INFO(r4, 0xe, &(0x7f00000004c0)=""/205) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000440)={0x4, &(0x7f0000000240)=[{}, {}, {}, {}]}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f00000001c0)={0x9, 0x6}) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x8000000000082003) ioctl$VIDIOC_ENUMSTD(r5, 0xc0485619, &(0x7f0000000040)={0x8001, 0x2000, "9812b3286b24862012a5ded836449d696ad4477500e1b212", {0x6, 0x6}, 0x4}) ioctl(0xffffffffffffffff, 0x2000c0984124, &(0x7f0000000080)) [ 2242.051693] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:28 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2242.103042] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:28 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:28 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0xffffffff00000000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x1de7, 0x20000) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) close(r3) close(r2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200000, 0x0) ioctl$PIO_SCRNMAP(r4, 0x4b41, &(0x7f0000000040)="4884b694b44700615eb27f1d6937de65b117f2073d175f28c0680a65b334a99c8e1731bc41ab78053d520426575906138127e175215a8c66e4a69932beaa28bf38ae59863ce70803449da02deea0bb3ec1183a3440f97e60eff6037758ab217531340af62fffc28c297fe2371644a88a1e0295bdf4aa4ff19ff7a4fa4a1a54346849877e76470c664a8e64aaba7536") [ 2242.514137] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:28 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) read(r0, &(0x7f0000001140)=""/4096, 0x1000) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) 05:53:28 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x5800000000000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:28 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:28 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f00000000c0)=0x5) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x213c000000000000, 0x200000) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f0000000140)="8c4f9379cc0dc7a2b466902dbdf6f75ca82ae5012ba9b7382201adda1d2d5b444b3865cc24294f078a6c0aa2f10cf8bcbdff67880960f55882329e06218244a443e6df733746bc945852749bfa6af4ef25b26918da13d7eb9a9833a8231f08e1ed61a1e1b2699a624d0b4ff6fb7ddcd4b5f477f39196f8bb9d2845a8b769de7f411e102e423412f2580bdf6e4f9d8bf521614cf16d0a160558fb3137f8f9a589f5e1dfddecf917a6be4be34137d6e2062a230e5c02bd69eed04ea3418ab5e5e90ea561ed06b07e47105275dd53af6075766d3ce6240ed27e9475371eef08378ae0d12c9e74") r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) fstat(r2, &(0x7f0000000240)) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f00000000c0)={@loopback, r4}, 0x14) close(r1) close(r1) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 05:53:28 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000480)='/dev/snd/seq\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$alg(0x26, 0x5, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f00000000c0)={0xffff, 0x3}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0xfffffffe, 0x1107, 0x2000000, 0x0, 0x1000000000000, 0x0, 0x6]}}) read(r3, &(0x7f0000000340)=""/251, 0xfb) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x5, 0x500}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000200)={@mcast1, 0x0, 0x0, 0x0, 0x5, 0xc3de, 0x10000000101, 0x1}, &(0x7f0000000180)=0xfffffffffffffc32) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil}) socket$inet6(0xa, 0x80000, 0x20) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000300)=@sack_info={0x0, 0x5, 0x4}, &(0x7f00000002c0)=0xc) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) r4 = shmget$private(0x0, 0x2000, 0xc1, &(0x7f0000ffa000/0x2000)=nil) shmctl$SHM_INFO(r4, 0xe, &(0x7f00000004c0)=""/205) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000440)={0x4, &(0x7f0000000240)=[{}, {}, {}, {}]}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f00000001c0)={0x9, 0x6}) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x8000000000082003) ioctl$VIDIOC_ENUMSTD(r5, 0xc0485619, &(0x7f0000000040)={0x8001, 0x2000, "9812b3286b24862012a5ded836449d696ad4477500e1b212", {0x6, 0x6}, 0x4}) ioctl(0xffffffffffffffff, 0x2000c0984124, &(0x7f0000000080)) 05:53:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0xfffffffffffffffe, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:53:29 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:29 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="10000000daffffff0f00000000000000eced93f2f4bb7f87b7e1546502bbfd05e8ce6730a10a6b926466627702b23ab45afa93b9d444cd972bdcf6b725f23e2208dcdf3dc36f540b303e646747a4c463ceb81e2986b283e2413d29e213f82a182faf7692123d10124f61d3d699523d7a7d40d929150b45fc8ee3e56da2dbb0274d465821134ee2908f7319591ce39eb7a7ec3d4d2ebf7773f414fd701b87a89bb8dfc9bf7a2f4a174d3864289d970d5456fb002de65ece163cd1c97e37f91ddfc0929c15cc6185bb736ee6"], 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x200000, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000080)={'bpq0\x00', 0x9}) 05:53:29 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000002c0)={'IDLETIMER\x00'}, &(0x7f0000000300)=0x1e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000003fe8)) socketpair(0x0, 0x0, 0x3, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)={&(0x7f00000000c0)='./file0\x00', r4}, 0x10) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = getgid() r6 = getgid() lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x4, &(0x7f0000000180)=[r5, r6, r7, r8]) r9 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r9, 0x84, 0x8, &(0x7f0000013e95), 0x3) setsockopt$IP6T_SO_SET_REPLACE(r9, 0x29, 0x40, 0x0, 0x0) fcntl$getown(r9, 0x9) close(r9) close(r1) 05:53:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x20) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0xfff, 0x4) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x85, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) close(r3) close(r2) 05:53:29 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x50000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:29 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:29 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:29 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000480)='/dev/snd/seq\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$alg(0x26, 0x5, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f00000000c0)={0xffff, 0x3}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0xfffffffe, 0x1107, 0x2000000, 0x0, 0x1000000000000, 0x0, 0x6]}}) read(r3, &(0x7f0000000340)=""/251, 0xfb) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x5, 0x500}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000200)={@mcast1, 0x0, 0x0, 0x0, 0x5, 0xc3de, 0x10000000101, 0x1}, &(0x7f0000000180)=0xfffffffffffffc32) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil}) socket$inet6(0xa, 0x80000, 0x20) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000300)=@sack_info={0x0, 0x5, 0x4}, &(0x7f00000002c0)=0xc) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) r4 = shmget$private(0x0, 0x2000, 0xc1, &(0x7f0000ffa000/0x2000)=nil) shmctl$SHM_INFO(r4, 0xe, &(0x7f00000004c0)=""/205) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000440)={0x4, &(0x7f0000000240)=[{}, {}, {}, {}]}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f00000001c0)={0x9, 0x6}) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x8000000000082003) ioctl$VIDIOC_ENUMSTD(r5, 0xc0485619, &(0x7f0000000040)={0x8001, 0x2000, "9812b3286b24862012a5ded836449d696ad4477500e1b212", {0x6, 0x6}, 0x4}) ioctl(0xffffffffffffffff, 0x2000c0984124, &(0x7f0000000080)) 05:53:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95)=0xfffffffffffffffe, 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:53:30 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) close(r2) close(r1) 05:53:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x6, 0x402200) write$P9_RLCREATE(r1, &(0x7f0000000280)={0x18, 0xf, 0x1, {{0x8, 0x3, 0x2}, 0x29d14fb7}}, 0x18) read$FUSE(r0, &(0x7f0000002000), 0x1245) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r2 = dup3(r0, r0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x80000001}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r3, 0x8000}, 0x8) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:30 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0xffffff8c, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:30 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:30 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:30 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x20030000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x400, 0x80) ioctl$VIDIOC_QUERYCAP(r3, 0x80685600, &(0x7f0000000040)) write$cgroup_type(r3, &(0x7f00000000c0)='threaded\x00', 0x8bb75b676cda29be) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) fanotify_mark(r2, 0xb0, 0x8000000, r3, &(0x7f0000000100)='./file0\x00') close(r1) 05:53:30 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:30 executing program 2: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x8ada, 0x8000) syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x802) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) dup2(r0, 0xffffffffffffff9c) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x254, 0x401) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r2, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:30 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:30 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="1000000300"], 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000040)={'syzkaller0\x00', {0x2, 0x4e23, @broadcast}}) 05:53:30 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200000, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000040)={0x0, @reserved}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000140)=0x100000001, 0xffffffffffffffb5) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) close(r3) close(r2) 05:53:31 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:31 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0xd01001fc}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:53:31 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x2c01}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:31 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000280)={0x0, 0x8a, "8acd7858e0c15a3465aac20b7ff72c6f6cd172e5461b9d628c51796dca6a4e36b03e5541b75ce0ca9f3cbb5217f93db962beb744d677d8bc993eb6cd6972d909f227ea99185c843f3086519ee96c53cf2b21c7f218700fc2fbd7da02a03fbc77f067a74aea3c1cbb60b21437f5d21ccc4d83661349634e9e1106d18c80c4f3bfba4dd564efef848c5c78"}, &(0x7f0000000340)=0x92) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f00000003c0)=@sack_info={r1, 0x3, 0x66c}, &(0x7f0000000180)=0x111) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x400, 0x200, 0x15, 0x8001}, &(0x7f0000000100)=0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x80802) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, 0x0, 0x0) close(r4) close(r3) 05:53:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:31 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x10000) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000040)=""/154) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) close(r3) close(r1) 05:53:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="e3248f1bed151e0bd4b1b589f92be1a40b95057b34d08355e8b4917a071701ac0d08451811d2a89a9afce8688f615193f0eb8703ec63c6134db93c6ba8fff320a87057fe14d18a40dcf892c874b9196c90e83cb8cde76a02c9e1e72edfa859f6d41b66687597b00f9396a509000000068928a8c400f038c17870d7e040517fc48e0ab5806b2e45c2212a660497c45eb1360fb5fe27146837801e7ad38db4e5cac8405489d98650309b2bfeeeb99fc905bf91d644c06531f89f0818ba311be1dc24f4ad9f26c645b28b0be727622f384f78fb487b1abb3d951a66bed0e0404e77579119fb2966346d771c6e421a84b43233fbfda4d3cd542be80486e22eff364ea4e484c07e3834b9cf0e4dd41804b0d30a1e2fb327b0cd3d1df8a32008cf7e3897e08595208a28f8ea2da59c6e1ed88c790af1a5b571b5ecac091c7c13735f7edce6c25493fe54374f5a296cc6d15fbd1700ca"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4, 0x40000) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0x382, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) fcntl$setsig(r2, 0xa, 0x31) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) close(r3) close(r2) 05:53:31 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r2, 0x0, 0x0) r3 = dup3(r1, r0, 0x80000) kcmp$KCMP_EPOLL_TFD(r2, r2, 0x7, r1, &(0x7f0000000040)={r3, r0, 0x654}) 05:53:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)={0x2a, 0x4, 0x0, {0x2, 0x4, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) 05:53:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:32 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xa00}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:32 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, 0x0, 0x46) close(r2) close(r1) 05:53:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x400000000000023c, &(0x7f0000000c80)) r7 = socket$pptp(0x18, 0x1, 0x2) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f00000007c0)={0x8, &(0x7f0000000780)=[{0x0, 0x19, 0x3, 0x432}, {0x6, 0x6, 0x3, 0x6a6}, {0xfffffffffffffff8, 0x8, 0x101, 0x8000}, {0x6, 0x7f, 0x6, 0x100000001}, {0xffffffff, 0x3f, 0x3877, 0x2}, {0x7, 0x0, 0x8, 0x13c4}, {0xffffffffffffffff, 0x4, 0x0, 0x4}, {0x7, 0x8000, 0x7, 0x4}]}, 0x10) r8 = semget$private(0x0, 0x1, 0x88) semctl$IPC_INFO(r8, 0x1, 0x3, &(0x7f0000000b00)=""/235) r9 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000001e40)={0x0, 0x0, 0x0}, &(0x7f0000001e00)=0xfffffffffffffdef) getgroups(0x1, &(0x7f0000000800)=[0xffffffffffffffff]) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000840)={0x0, 0x0, 0x0}, &(0x7f0000000880)=0xc) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)=0x0) r14 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000980)='/dev/dlm-monitor\x00', 0x20100, 0x0) ioctl$VT_GETSTATE(r14, 0x5603, &(0x7f00000009c0)={0x9, 0x2, 0x1}) r15 = getgid() lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000a40)=ANY=[@ANYBLOB="02000000010003000000000002000700", @ANYRES32=r1, @ANYBLOB="02000000", @ANYRES32=r2, @ANYBLOB="04f701ff0000000000000000", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="08000300", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="0800001e", @ANYRES32, @ANYBLOB="08000200", @ANYRES32=r10, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r11, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r12, @ANYBLOB="08000200", @ANYRES32=r13, @ANYBLOB="08000300", @ANYRES32=r15, @ANYBLOB="10000200007ba9f3f9b841e69c0000eab0c2024e4c1a1fafa4bc193d00"], 0x84, 0x2) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:32 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2246.608317] __nla_parse: 23 callbacks suppressed [ 2246.608330] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0xfffffffffffffc88) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000000)=0x1, 0x4) close(r2) close(r1) [ 2246.665780] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:32 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:32 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) syz_open_procfs(r3, &(0x7f0000000040)='uid_map\x00') setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) [ 2246.798161] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2246.816708] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r2, 0x0, 0x0) r3 = dup3(r1, r0, 0x80000) kcmp$KCMP_EPOLL_TFD(r2, r2, 0x7, r1, &(0x7f0000000040)={r3, r0, 0x654}) 05:53:35 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:35 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x10, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000040)={0x4, 0x3, {0x0, 0x1, 0xffff, 0x3, 0xb54d}}) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x80800) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$TCXONC(r1, 0x540a, 0x898) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) close(r3) close(r0) r4 = semget$private(0x0, 0x3, 0x40) semctl$GETALL(r4, 0x0, 0xd, &(0x7f0000000000)=""/62) close(r2) 05:53:35 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xc2ffffff00000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) [ 2249.014475] Unknown ioctl -1067429051 [ 2249.030360] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:35 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2249.060090] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2249.087383] Unknown ioctl 21514 05:53:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x81) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000003c0)='/dev/vcsa#\x00', 0x8000, 0x80) ioctl$VIDIOC_G_AUDIO(r1, 0x80345621, &(0x7f00000008c0)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) r3 = getgid() stat(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f00000000c0)=[0x0, 0xee00, 0xffffffffffffffff]) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) write$FUSE_DIRENTPLUS(r0, &(0x7f00000006c0)={0x1e8, 0xf1e051b5fdf138b7, 0x8, [{{0x0, 0x3, 0x1f, 0xfffffffffffffff7, 0x6, 0x401, {0x3, 0xdbe2, 0x0, 0x735, 0x800, 0x0, 0x87e, 0x9, 0x99, 0x9, 0x1, r2, r3, 0x2, 0x20}}, {0x0, 0xfffffffffffff95c, 0x4, 0x39, '$\\,*'}}, {{0x3, 0x3, 0x4be, 0x5, 0x3f, 0x0, {0x3, 0x7e05, 0x3ff, 0x47, 0x40, 0x5, 0x80, 0x100000001, 0x251, 0x7, 0x7, r4, r5, 0x3, 0x4}}, {0x5, 0x7f, 0x0, 0x2}}, {{0x5, 0x3, 0x8, 0x9, 0x8000, 0x8, {0x1, 0x200, 0x0, 0x4, 0x6a577af2, 0x7fffffff, 0xfffffffffffffe00, 0x4, 0x8, 0xe0, 0x4, r6, r7, 0x80000001, 0x9}}, {0x3, 0x4edc, 0x2, 0x9, '$*'}}]}, 0x1e8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000900)={0xd29, 0x800a, 0x1, 0x0, 0x0}, &(0x7f0000000940)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000980)={r8, 0x575}, &(0x7f00000009c0)=0x8) 05:53:35 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2249.143043] Unknown ioctl -1067429051 [ 2249.153590] Unknown ioctl 21514 05:53:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r0) close(r1) [ 2249.255876] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:35 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2249.298929] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:35 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2249.504380] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2249.524842] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x29) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="4779f34b7d874af9f9c07b3f7f9585f24d80c1678549017bc5b657e454d3a4afc29d831e10392a835f21485a5b801b1f82d1d85a95e6758488107111878f9ca93858d41dc113a951d016622f1f796cab3077ded67382b1f3a9280ed8293144b1e7f05cc83c8ff40ddec1ae98648b408a3225b586b3bf21de9c") ptrace$cont(0x1f, r2, 0x0, 0x0) r3 = dup3(r1, r0, 0x80000) kcmp$KCMP_EPOLL_TFD(r2, r2, 0x7, r1, &(0x7f0000000040)={r3, r0, 0x654}) 05:53:38 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200080, 0x0) ioctl$KVM_GET_PIT(r3, 0xc048ae65, &(0x7f0000000040)) close(r1) 05:53:38 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:38 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x5000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0xffffffffffffffe1, 0x0, 0x22}, 0x3c995750f076f077) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) [ 2252.091134] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2252.127298] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x10080) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r4, 0x1f}}, 0x10) 05:53:38 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:38 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2252.292310] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2252.304214] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0xfffffdb3) close(r2) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000000)={0x0, 0xfff, 0x7, [0x3982, 0x1ff, 0x2, 0x7fffffff, 0x200000000, 0x7ff, 0x101]}, &(0x7f0000000040)=0x16) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e21, 0xa0f, @mcast2, 0x1f}}, 0x9, 0x0, 0x10000, "afa378742a621a72a40033380536a47495f3ac307344ed6b6c2aa46f56a407d5e93b737d23ad6a26061f3f3332074db71b6d8f4fd0941e26b02aa097fea8ed0ba335f4c6f9c9d57aa63f8e74d93280be"}, 0xd8) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={r3, 0x30a}, &(0x7f00000000c0)=0x8) close(r1) 05:53:38 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:38 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2252.462346] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2252.474525] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:41 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000480)='/dev/snd/seq\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$alg(0x26, 0x5, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f00000000c0)={0xffff, 0x3}) read(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x5, 0x500}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, &(0x7f0000000180)) socket$inet6(0xa, 0x80000, 0x20) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000005c0)=ANY=[], 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000300)=@sack_info={0x0, 0x5, 0x4}, &(0x7f00000002c0)=0xc) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) r3 = shmget$private(0x0, 0x2000, 0xc1, &(0x7f0000ffa000/0x2000)=nil) shmctl$SHM_INFO(r3, 0xe, &(0x7f00000004c0)=""/205) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000440)={0x4, &(0x7f0000000240)=[{}, {}, {}, {}]}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f00000001c0)={0x9, 0x6}) r4 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x8000000000082003) ioctl$VIDIOC_ENUMSTD(r4, 0xc0485619, &(0x7f0000000040)={0x8001, 0x2000, "9812b3286b24862012a5ded836449d696ad4477500e1b212", {0x6, 0x6}, 0x4}) ioctl(0xffffffffffffffff, 0x2000c0984124, &(0x7f0000000080)) 05:53:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f0000000000), &(0x7f0000000040)=0x14) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:53:41 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:41 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:41 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x1f4}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_Pd=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f0000000380)=0xc) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x1, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1200}}], [{@hash='hash'}, {@subj_user={'subj_user'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/hwrng\x00'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x31, 0x37, 0x76, 0x0, 0x37, 0x73, 0x64], 0x2d, [0x37, 0x7f, 0x3d], 0x2d, [0x31, 0x7d, 0x0, 0x37], 0x2d, [0x77, 0x39, 0x63, 0x62], 0x2d, [0x77, 0x0, 0x38, 0x76, 0x35, 0x37, 0x3d, 0x35]}}}]}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@ipv4={[], [], @loopback}}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="10000000faffffff04000000000000002808ac3fbfa728cea5c5fba54d435a690944a051c831103de2005e0a5c4dd2ce20d59544adf789ffc5b9971b635bb12f19f54e5f8d9283528ec3c0d37d346d964ff093ccef175748828c05a8ec4470d725f1a8e22eefff0300001cfbb29d174f0dc3efc36f56dfb6"], 0x10) [ 2255.187466] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2255.208501] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="10000000daffffffa500000000a70a0358a61f4a231d40000000"], 0x10) 05:53:41 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x3a9) close(r3) r4 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xf, 0x25b5, 0x400, 0x3, 0xa, r4, 0x6}, 0x2c) close(r2) getsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000080), &(0x7f0000000100)=0xb) 05:53:41 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2255.395491] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2255.428888] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x4, 0x14, &(0x7f0000000540)=ANY=[@ANYBLOB="bf16000000000000b7070000010000ed407000000000e0ff480000000000000095000000000000004bafea1172cd02394d3f4b50a72f50c4110a53f550fe69815fa2811e5753a11cc02e11bc809273cd2586528a35a7a9d57cded8ddb62ff40f41bf7ada3ce5d4220cd8c383101b611fb5da95c7c10a308f8092348f2ea7c45c4f617773587961aaf33ae30991e37388dbd5f1f05b466d027824acf79eb80fdc"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)='C\x00\x00\x00\x00\x00\x00\f\x00\x00\x00\x00\x00\x00', 0x0}, 0x28) 05:53:41 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0xffffff0e) close(r2) eventfd2(0x967b, 0x1) r3 = getpid() syz_open_procfs(r3, &(0x7f0000000000)='net/bnep\x00') close(r1) 05:53:41 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000000c0)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x10, 0x0, &(0x7f0000000240)=[@free_buffer, @register_looper], 0x0, 0x0, &(0x7f0000000280)}) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000fedffe)}) 05:53:41 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2255.729510] binder: 13502:13508 BC_FREE_BUFFER u0000000000000000 no match [ 2255.748597] binder: 13502:13508 ERROR: BC_REGISTER_LOOPER called without request [ 2255.793984] binder: 13502:13514 BC_FREE_BUFFER u0000000000000000 no match [ 2255.805643] binder: 13502:13514 ERROR: BC_REGISTER_LOOPER called without request [ 2255.807172] binder: BINDER_SET_CONTEXT_MGR already set [ 2255.843700] binder: 13502:13508 ioctl 40046207 0 returned -16 05:53:42 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x58000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x400000000) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x2}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0xfffffe46) close(r2) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) close(r1) 05:53:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="1b52479aad3a1cf0c9330c3dd408e180c539"]) read$FUSE(r0, &(0x7f00000040c0), 0x1364) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:42 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000000c0)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x10, 0x0, &(0x7f0000000240)=[@free_buffer, @register_looper], 0x0, 0x0, &(0x7f0000000280)}) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000fedffe)}) 05:53:42 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = memfd_create(&(0x7f0000000000)='security]\x00', 0x2) ioctl$TIOCSBRK(r2, 0x5427) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) socket$bt_rfcomm(0x1f, 0x0, 0x3) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) close(r3) close(r1) 05:53:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x111100, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f00000000c0)={r2, 0x2}) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000100)) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, 0x0, 0x0) close(r4) close(r0) [ 2256.408915] binder: 13528:13532 BC_FREE_BUFFER u0000000000000000 no match [ 2256.425021] binder: 13528:13532 ERROR: BC_REGISTER_LOOPER called without request 05:53:42 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readv(r0, &(0x7f0000000240)=[{&(0x7f0000000080)=""/196, 0xc4}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x2) 05:53:42 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x100000000000) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:42 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x34000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1}, 0x6}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000480)={0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x1, 0x0, 0xfffffffff7ffffff}) 05:53:42 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:42 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) membarrier(0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="3db0a6aa5e4664556122c7e7c1e8"]) read$FUSE(r1, &(0x7f0000003000), 0xffffffffffffff17) read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) getsockname(0xffffffffffffff9c, &(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) accept$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c) 05:53:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xf483, 0x10000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x7, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:43 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2257.096331] __nla_parse: 10 callbacks suppressed [ 2257.096345] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2257.170360] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2257.287758] FAULT_FLAG_ALLOW_RETRY missing 30 [ 2257.294892] CPU: 0 PID: 13542 Comm: syz-executor0 Not tainted 4.20.0-rc5-next-20181207+ #163 [ 2257.303510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2257.312872] Call Trace: [ 2257.315478] dump_stack+0x244/0x39d [ 2257.319129] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2257.324339] ? attach_entity_load_avg+0x860/0x860 [ 2257.329207] ? __lock_acquire+0x62f/0x4c20 [ 2257.333479] handle_userfault.cold.30+0x47/0x62 [ 2257.338172] ? userfaultfd_ioctl+0x5610/0x5610 [ 2257.342773] ? mark_held_locks+0x130/0x130 [ 2257.347021] ? __update_load_avg_blocked_se+0x690/0x690 [ 2257.352403] ? __lock_is_held+0xb5/0x140 [ 2257.356577] ? pvcalls_back_event+0x1768/0x3382 [ 2257.361274] ? userfaultfd_ctx_put+0x830/0x830 [ 2257.365872] ? print_usage_bug+0xc0/0xc0 [ 2257.369953] ? graph_lock+0x220/0x270 [ 2257.373766] ? attach_entity_load_avg+0x860/0x860 [ 2257.378630] ? kasan_check_read+0x11/0x20 [ 2257.382791] ? print_usage_bug+0xc0/0xc0 [ 2257.386863] ? graph_lock+0x270/0x270 [ 2257.390688] ? lock_unpin_lock+0x4a0/0x4a0 [ 2257.394944] ? find_held_lock+0x36/0x1c0 [ 2257.399026] ? __handle_mm_fault+0x4d13/0x5b70 [ 2257.403625] ? lock_downgrade+0x900/0x900 [ 2257.407795] ? kasan_check_read+0x11/0x20 [ 2257.411954] ? do_raw_spin_unlock+0xa7/0x330 [ 2257.416372] ? do_raw_spin_trylock+0x270/0x270 [ 2257.420965] ? fault_dirty_shared_page.isra.87+0x320/0x320 [ 2257.426611] __handle_mm_fault+0x4d20/0x5b70 [ 2257.431043] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 2257.435899] ? print_usage_bug+0xc0/0xc0 [ 2257.439970] ? __perf_event_task_sched_in+0x2a9/0xb60 [ 2257.445167] ? graph_lock+0x270/0x270 [ 2257.449020] ? graph_lock+0x270/0x270 [ 2257.452827] ? graph_lock+0x270/0x270 [ 2257.456648] ? find_held_lock+0x36/0x1c0 [ 2257.460735] ? handle_mm_fault+0x42a/0xc70 [ 2257.464987] ? lock_downgrade+0x900/0x900 [ 2257.469148] ? check_preemption_disabled+0x48/0x280 [ 2257.474195] ? kasan_check_read+0x11/0x20 [ 2257.478372] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2257.483658] ? rcu_read_unlock_special+0x370/0x370 [ 2257.488601] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2257.494154] ? check_preemption_disabled+0x48/0x280 [ 2257.499189] handle_mm_fault+0x54f/0xc70 [ 2257.503279] ? __handle_mm_fault+0x5b70/0x5b70 [ 2257.507875] ? find_vma+0x34/0x190 [ 2257.511429] __do_page_fault+0x5f6/0xd70 [ 2257.515512] do_page_fault+0xf2/0x7e0 [ 2257.519324] ? vmalloc_sync_all+0x30/0x30 [ 2257.523482] ? error_entry+0x76/0xd0 [ 2257.527262] ? trace_hardirqs_off_caller+0xbb/0x310 [ 2257.532294] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2257.537178] ? trace_hardirqs_on_caller+0x310/0x310 [ 2257.542248] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2257.547111] page_fault+0x1e/0x30 [ 2257.550572] RIP: 0010:__get_user_4+0x21/0x30 [ 2257.554990] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 55 65 48 8b 14 25 40 ee 01 00 48 3b 82 18 14 00 00 73 43 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 25 65 [ 2257.573902] RSP: 0018:ffff8881d93bf4b8 EFLAGS: 00010202 [ 2257.579277] RAX: 0000000020013e98 RBX: 1ffff1103b277e9e RCX: ffffc90005a50000 [ 2257.586578] RDX: ffffffffffffffff RSI: ffffffff81b29653 RDI: 0000000000000282 [ 2257.593855] RBP: ffff8881d93bfcb8 R08: 1ffff1103b277e74 R09: 0000000000000008 [ 2257.601131] R10: 0000000000000002 R11: ffff888183da23c0 R12: 0000000000000008 [ 2257.608409] R13: ffff8881b41f4000 R14: 0000000000000004 R15: dffffc0000000000 [ 2257.615712] ? __might_fault+0x1a3/0x1e0 [ 2257.619824] ? sctp_setsockopt+0x17d7/0x7380 [ 2257.624269] ? sctp_setsockopt_paddr_thresholds+0x560/0x560 [ 2257.629995] ? __lock_acquire+0x62f/0x4c20 [ 2257.634264] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2257.639814] ? get_futex_value_locked+0xcb/0xf0 [ 2257.644496] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2257.649520] ? futex_wait_setup+0x266/0x3e0 [ 2257.653865] ? mark_held_locks+0x130/0x130 [ 2257.658115] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 2257.663327] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 2257.668441] ? futex_wait+0x5ec/0xa50 [ 2257.672266] ? print_usage_bug+0xc0/0xc0 [ 2257.676353] ? print_usage_bug+0xc0/0xc0 [ 2257.680423] ? futex_wait_setup+0x3e0/0x3e0 [ 2257.684758] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 2257.689977] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 2257.695090] ? futex_wake+0x304/0x760 [ 2257.698909] ? graph_lock+0x270/0x270 [ 2257.702720] ? __lock_acquire+0x62f/0x4c20 [ 2257.706981] ? find_held_lock+0x36/0x1c0 [ 2257.711062] ? __fget+0x4aa/0x740 [ 2257.714531] ? lock_downgrade+0x900/0x900 [ 2257.718693] ? check_preemption_disabled+0x48/0x280 [ 2257.723726] ? kasan_check_read+0x11/0x20 [ 2257.727884] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2257.733177] ? rcu_read_unlock_special+0x370/0x370 [ 2257.738175] ? __fget+0x4d1/0x740 [ 2257.741661] ? ksys_dup3+0x680/0x680 [ 2257.745399] ? perf_trace_sched_process_exec+0x860/0x860 [ 2257.750864] ? find_held_lock+0x36/0x1c0 [ 2257.754945] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2257.760498] ? aa_label_sk_perm+0x91/0x100 [ 2257.764751] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 2257.769691] ? aa_sk_perm+0x22b/0x8e0 [ 2257.773508] ? fget_raw+0x20/0x20 [ 2257.776972] ? perf_trace_sched_process_exec+0x860/0x860 [ 2257.782436] ? aa_af_perm+0x5a0/0x5a0 [ 2257.786290] ? aa_sock_opt_perm.isra.13+0xa1/0x130 [ 2257.791253] sock_common_setsockopt+0x9a/0xe0 [ 2257.795769] __sys_setsockopt+0x1ba/0x3c0 [ 2257.799949] ? kernel_accept+0x310/0x310 [ 2257.804026] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2257.808620] ? trace_hardirqs_on+0xbd/0x310 [ 2257.812953] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2257.818332] ? trace_hardirqs_off_caller+0x310/0x310 [ 2257.823456] __x64_sys_setsockopt+0xbe/0x150 [ 2257.827879] do_syscall_64+0x1b9/0x820 [ 2257.831777] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2257.837152] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2257.842091] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2257.846948] ? trace_hardirqs_on_caller+0x310/0x310 [ 2257.851979] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2257.857016] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2257.862046] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2257.866920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2257.872126] RIP: 0033:0x457659 [ 2257.875332] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2257.894251] RSP: 002b:00007f9213be0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2257.901965] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457659 [ 2257.909249] RDX: 0000000000000008 RSI: 0000000000000084 RDI: 0000000000000006 [ 2257.916527] RBP: 000000000072bf00 R08: 0000000000000004 R09: 0000000000000000 [ 2257.923807] R10: 0000000020013e95 R11: 0000000000000246 R12: 00007f9213be16d4 [ 2257.931083] R13: 00000000004cab90 R14: 00000000004d76d8 R15: 00000000ffffffff 05:53:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0xb, 0x802, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000040)={0x0, 0x620, {0x4, 0x9, 0x3017, 0x6, 0x1, 0x7, 0x3, 0x7}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) close(r3) close(r2) 05:53:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:44 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1}, 0x6}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000480)={0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x1, 0x0, 0xfffffffff7ffffff}) 05:53:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_DIRENT(r0, &(0x7f0000000040)={0x58, 0x0, 0x4, [{0x2, 0x800, 0x17, 0x3, 'trusted.overlay.opaque\x00'}, {0x0, 0x1, 0x0, 0x80000000}]}, 0x58) fsetxattr$security_smack_transmute(r0, &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x1) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) r1 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000005c0)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@remote}}, &(0x7f0000000380)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000003c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) r7 = getegid() fstat(r0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getegid() r10 = getgid() fsetxattr$system_posix_acl(r0, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000a80)={{}, {0x1, 0x1}, [{0x2, 0x1, r1}, {0x2, 0x7, r2}, {0x2, 0x4, r3}, {0x2, 0x3, r4}, {0x2, 0x2, r5}, {0x2, 0x3, r6}], {0x4, 0x2}, [{0x8, 0x1, r7}, {0x8, 0x3, r8}, {0x8, 0x1, r9}, {0x8, 0x1, r10}], {0x10, 0x5}, {0x20, 0x1}}, 0x74, 0x2) 05:53:44 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x9000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) [ 2258.006442] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2258.030984] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:44 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x18, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2258.227707] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:44 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000001c0)=""/220) 05:53:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) [ 2258.281151] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x1a, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:44 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000200)='fd', 0xffffffffffffffff}, 0x30) fcntl$setsig(r1, 0xa, 0x2f) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:44 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000480)='/dev/snd/seq\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0xfffffffe, 0x1107, 0x2000000, 0x0, 0x1000000000000, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000200)={@mcast1, 0x0, 0x0, 0x0, 0x5, 0xc3de, 0x10000000101, 0x1}, &(0x7f0000000180)=0xfffffffffffffc32) socket$inet6(0xa, 0x80000, 0x20) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000300)=@sack_info={0x0, 0x5, 0x4}, &(0x7f00000002c0)=0xc) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) shmget$private(0x0, 0x2000, 0xc1, &(0x7f0000ffa000/0x2000)=nil) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000440)={0x4, &(0x7f0000000240)=[{}, {}, {}, {}]}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f00000001c0)={0x9, 0x6}) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x8000000000082003) ioctl(0xffffffffffffffff, 0x2000c0984124, &(0x7f0000000080)) [ 2258.471915] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2258.483434] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:44 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x18, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="ef1c16889c60e27862070240804bae1422468024d27f96646e42e4a3ec195efa0c037728317eb50d60859380ff0000e9e5ed724cf91690741145f6693ddb83c0e0c87627065dc2b46a505722f5050beedd4edbafd51b01c8b87f3959ca18ce497e95726fd236475cf1a73a8110254d289c79f5a966637377de66ab37a2e12ca1", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) mknod(&(0x7f0000000040)='./file0\x00', 0x1, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x101000, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) [ 2258.655444] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2258.676428] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:45 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x50}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000013000/0x1000)=nil, 0x1000, 0x1, 0x10001c, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x6, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:53:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x1a, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='_,']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="10000000daffffff04000000000000003cd4b9a020f56a40b47a4479ea949bc87863cb510374ac140fc5b6196ed9647c41142104943447e6ac3a8bd16f4006a8794bf3105f8272dc5efe05d47592391952764d612c7c3d3eb3cfcc0ec11ba3c8a37da3a5a959803d163116c8629ca37be7db9a2fb837e1d3c420197f719d25e66899797f8cf07d9fc721852bb4cd7860ece1d611e192312c3239c3b9f7c6b444ce70de001c05e78a57b99198dbc889a20d267a5e1f03ad433dd12d4a5d62dde908b1d60ca174f7247b699209703860811792a6f1b26f0d60cc821f06ce26e4656523c1"], 0x10) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0x9) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f00000000c0)={0x216, 0x3, 0x92, 0x7fff, 0x4, 0xab67}) 05:53:45 executing program 5: setsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, 0x0, 0x0) mknod(&(0x7f0000000040)='./bus\x00', 0x4000000000008000, 0x6c7) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f00000016c0)="891c3618d8a9fafa3b814c11c4724cbaaafa054788b1ca20e7d04dd25a47857e9898e7f867839aae0f4f8764614c07a5fbb12f4ef098a1345b910c92b5da4e2a5c355c7f34978c8b09f9d3363632572645020b6ffa1e0ec3e0eff158f6ff995b696f1dced1968c0a", 0x68}], 0x1) 05:53:45 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:45 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) 05:53:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x3f00000000000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0xffffffffffffffe1) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x1a9, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) r3 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$ASHMEM_GET_PIN_STATUS(r3, 0x7709, 0x0) close(r1) 05:53:45 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1}, 0x6}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x20, 0xffffffffffffffff, 0x1, 0x3ff800000000000}) 05:53:45 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xd8}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:45 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000012000/0x4000)=nil, 0x4000}, 0xfffffffffffffffd}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) r3 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xfffffffffffffffe, 0x163200) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r3, 0x4020565b, &(0x7f0000000040)={0x8001009, 0x80000000, 0x3}) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:53:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e20, @remote}}, 0x7, 0x20, 0x5, 0x0, 0x9}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000200)={0x100000001, 0x8, 0x5, 0x81, r2}, &(0x7f0000000280)=0x10) pwrite64(r0, &(0x7f0000000040)="1f52312b1eaf94004cb73230", 0xc, 0x0) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x3f00, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:45 executing program 5: r0 = socket$inet(0x10, 0x4000000000000003, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000100007031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 2259.958698] netlink: 'syz-executor5': attribute type 1 has an invalid length. 05:53:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sync_file_range(r2, 0xf03, 0x7, 0x1) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000000)=0x8, 0x4) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x3ce2a94c, 0x40) close(r1) 05:53:46 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000480)='/dev/snd/seq\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$alg(0x26, 0x5, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f00000000c0)={0xffff, 0x3}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0xfffffffe, 0x1107, 0x2000000, 0x0, 0x1000000000000, 0x0, 0x6]}}) read(r3, &(0x7f0000000340)=""/251, 0xfb) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x5, 0x500}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000200)={@mcast1, 0x0, 0x0, 0x0, 0x5, 0xc3de, 0x10000000101, 0x1}, &(0x7f0000000180)=0xfffffffffffffc32) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil}) socket$inet6(0xa, 0x80000, 0x20) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000300)=@sack_info={0x0, 0x5, 0x4}, &(0x7f00000002c0)=0xc) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) r4 = shmget$private(0x0, 0x2000, 0xc1, &(0x7f0000ffa000/0x2000)=nil) shmctl$SHM_INFO(r4, 0xe, &(0x7f00000004c0)=""/205) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000440)={0x3, &(0x7f0000000240)=[{}, {}, {}]}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f00000001c0)={0x9, 0x6}) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x8000000000082003) ioctl$VIDIOC_ENUMSTD(r5, 0xc0485619, &(0x7f0000000040)={0x8001, 0x2000, "9812b3286b24862012a5ded836449d696ad4477500e1b212", {0x6, 0x6}, 0x4}) ioctl(0xffffffffffffffff, 0x2000c0984124, &(0x7f0000000080)) 05:53:46 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x10, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000003000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) finit_module(r0, &(0x7f0000000040)='\x00', 0x1) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:46 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x74, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f0000000040)=""/102) close(r1) 05:53:46 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:46 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xe000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:46 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000480)='/dev/snd/seq\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$alg(0x26, 0x5, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f00000000c0)={0xffff, 0x3}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0xfffffffe, 0x1107, 0x2000000, 0x0, 0x1000000000000, 0x0, 0x6]}}) read(r3, &(0x7f0000000340)=""/251, 0xfb) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x5, 0x500}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000200)={@mcast1, 0x0, 0x0, 0x0, 0x5, 0xc3de, 0x10000000101, 0x1}, &(0x7f0000000180)=0xfffffffffffffc32) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil}) socket$inet6(0xa, 0x80000, 0x20) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000300)=@sack_info={0x0, 0x5, 0x4}, &(0x7f00000002c0)=0xc) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) r4 = shmget$private(0x0, 0x2000, 0xc1, &(0x7f0000ffa000/0x2000)=nil) shmctl$SHM_INFO(r4, 0xe, &(0x7f00000004c0)=""/205) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000440)={0x3, &(0x7f0000000240)=[{}, {}, {}]}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f00000001c0)={0x9, 0x6}) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x8000000000082003) ioctl$VIDIOC_ENUMSTD(r5, 0xc0485619, &(0x7f0000000040)={0x8001, 0x2000, "9812b3286b24862012a5ded836449d696ad4477500e1b212", {0x6, 0x6}, 0x4}) ioctl(0xffffffffffffffff, 0x2000c0984124, &(0x7f0000000080)) 05:53:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x90080, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000340)={0x0, 0x3, 0xffff, 0x6, 0x75f49c63, 0x100000000, 0x2, 0xffff, {0x0, @in6={{0xa, 0x4e23, 0x1, @dev={0xfe, 0x80, [], 0x1a}, 0x8}}, 0x8000000000000, 0x9, 0x8, 0x3, 0x3}}, &(0x7f0000000080)=0xb0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000000c0)={r2, 0x6}, 0x8) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:47 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x1000000000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:47 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89a1, &(0x7f0000000180)={"62726964676530000000026b00"}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) dup3(r1, r0, 0x0) ppoll(&(0x7f00000005c0)=[{}], 0x1, 0x0, &(0x7f00000007c0)={0xfffffffffffff39f}, 0x8) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x10002, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000500)=@add_del={0x2, &(0x7f00000004c0)='ip_vti0\x00', 0x5d}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000240)=""/30, 0x1e) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) 05:53:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x14) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000080)={r3, 0xfffffffffffffffd, 0x101}, 0x10) close(r0) 05:53:47 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) timer_create(0x4, &(0x7f00000000c0)={0x0, 0x1b, 0x5, @thr={&(0x7f0000000040)="2521fb41da0b35b7a9b88e1ed0126c3e7d5efded07e914dde0154906cf55e1cfebc5117a3a481c20cf4fde37de85c6eaa972c0e5c8873497d373fc4b87069a39cf7da2ec0d1384b4dfbd98a805abb54d97e7bb78b15ab233e9ab4fa0", &(0x7f0000000340)="00973336b202f82581f67acbf7f85b2fe81b4e60ad0efdef7b62f0719f5271c053a9691e679245991c83dfae02c1973856395551ea504e7febb57670d9943cb15e933e6683af8c70e8abf2bb0cb0546d34f1a55e5a9ad704c3b2c2180a774c545239e414a3a60b2140f33686d1a90bddf6eb8d8cdb7f4baec305651009d7b5589bebc06b82f79215e66183ee77452d2294be43709cd05c15a4fcb3d257cdbb8a643a87f13fc5c6ed37ed2126845c04fcc13541536ec908b4459082"}}, &(0x7f0000000200)) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="10000004daff65b63ea0a0b1ea6d0000"], 0x10) 05:53:47 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x4000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:47 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="52bcbdbcdaffffff0400000100000000"], 0x10) 05:53:47 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x8c430000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:47 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x8, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:47 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:47 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:47 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x100000000000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:48 executing program 5: 05:53:48 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x20) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) close(r3) close(r2) 05:53:48 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x2, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:48 executing program 5: [ 2262.109789] __nla_parse: 22 callbacks suppressed [ 2262.109799] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2262.137058] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:48 executing program 5: 05:53:48 executing program 5: 05:53:48 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x983a}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:48 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r1) close(r1) 05:53:48 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x4, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="10000000daffff000000000000000000"], 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0xa440, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'raw\x00'}, &(0x7f0000000200)=0x54) ioctl$sock_netdev_private(r1, 0x89f0, &(0x7f0000000280)="a9c8ad4021efafecda31b58c7beca3424c9294d0000e04c36ecb57edcdd878f89ee3bdc744204e1ce3409d787b7a4269ffa9f2") setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000002c0)=0x9, 0x4) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000080)=0xffffffffffffffff, 0x4) 05:53:48 executing program 5: 05:53:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40000, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000080)={0x1, 0x6, 0x7}) read$FUSE(r0, &(0x7f0000002000), 0x1000) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f00000004c0)={0x100000001, {{0x2, 0x4e22, @multicast1}}, 0x1, 0x3, [{{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e24, @broadcast}}, {{0x2, 0x4e23, @multicast1}}]}, 0x210) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000200)=0x30) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000340)={0xbf0000, 0x4, 0x100000000, [], &(0x7f00000002c0)={0x9b0961, 0x80, [], @string=&(0x7f0000000280)=0x7f}}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:48 executing program 5: [ 2262.792082] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2262.809997] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:48 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:48 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x800000000000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:49 executing program 5: 05:53:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) signalfd(r1, &(0x7f0000000000)={0x1995}, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) [ 2262.948670] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2262.989822] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:49 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x20c49a}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000003000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:49 executing program 5: 05:53:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x141000) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:53:49 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x4000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:49 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:49 executing program 5: 05:53:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') fallocate(r2, 0x0, 0x8, 0x40) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) close(r3) close(r1) [ 2263.635640] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2263.673266] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:49 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x300, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:49 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:49 executing program 5: 05:53:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1075c97d8bd678271863d49ebd5f7856011edc651f6ef64539625ad8da9958853e628cb7739716800c0296685c1d66b3055d7ffb6cb5316ab93c9e6fa2be09582c033a6385f4e1302e9e58a5eaf04168cba2062b6b99df0a86deefc7e33fe7bc7f116ceb6f7a25a8dcba7bfb0ff60c0b167b4f22be1a12e6a97fafb3f7be9b8d5e88e4a0d9f2dcd44e9786420d823ac2311c00c0a764a4d498e0d3f8640e0d6bc731846fbbcb86"], 0x10) [ 2263.845781] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2263.877464] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:50 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x10000000000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:50 executing program 5: 05:53:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80802) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x17e) close(r2) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$clear(0x7, r3) close(r1) 05:53:50 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:50 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x7, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:50 executing program 5: 05:53:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x3d3a, 0x3, 0xffffffffffffffc1, 0x20, 0x4}, &(0x7f0000000040)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x2f3, 0x1}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080)={r3, 0x8001, 0x30}, 0xc) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) 05:53:50 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:50 executing program 5: 05:53:50 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x9, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="4605000013000000643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) recvfrom(r0, &(0x7f0000000040)=""/192, 0xc0, 0x40000040, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:50 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:51 executing program 5: 05:53:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r1) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x100, 0x0) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x3) fcntl$setpipe(r0, 0x407, 0xb1) close(r1) 05:53:51 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0xffffffff00000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:51 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:51 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x500000000000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:51 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x4, 0x20040) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000200)=0x4) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000740)=0x14) sendmsg$can_bcm(r2, &(0x7f0000000880)={&(0x7f0000000780)={0x1d, r3}, 0x10, &(0x7f0000000840)={&(0x7f00000007c0)={0x7, 0x8, 0x3, {0x0, 0x7530}, {0x77359400}, {0x2, 0x7, 0x400, 0x1}, 0x1, @can={{0x2, 0x3, 0x100000001, 0x1a}, 0x3, 0x1, 0x0, 0x0, "c81df477c5bd8d04"}}, 0x48}, 0x1, 0x0, 0x0, 0x20040000}, 0x1) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0xffffffa0, 0x1) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:51 executing program 5: 05:53:51 executing program 5: 05:53:51 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:51 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0xfbffffff00000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000001c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket(0x10, 0x80007, 0xfffffffffffffffb) getsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x8) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) close(r3) close(r1) io_setup(0x2, &(0x7f0000000000)=0x0) io_pgetevents(r4, 0x401, 0x117, &(0x7f0000000040)=[{}], &(0x7f0000000080)={0x77359400}, &(0x7f0000000100)={&(0x7f00000000c0)={0x9}, 0x8}) 05:53:51 executing program 5: 05:53:51 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:51 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x400300, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:51 executing program 5: 05:53:51 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:52 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x5000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:52 executing program 5: r0 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={"627269646765300000010000ffffffc3"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(0x0, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:53:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x10000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r2) 05:53:52 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00407c28715fed9d2c15ab6408ab08298e0e9cd7fe7c3727fe0cd863eb200c5d589a36c5733836a6e48acb8c4f6ef270572e51b2"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) setxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@sha1={0x1, "7260217eb3966c994cc6f8f47885dd12968d640d"}, 0x15, 0x3) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) [ 2266.301108] bridge0: port 2(bridge_slave_1) entered disabled state [ 2266.307995] bridge0: port 1(bridge_slave_0) entered disabled state 05:53:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x5000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={0xffffffffffffff9c}) r3 = dup2(r0, r0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000080)={r3}) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x600, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:52 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000080)={0x7, 0x2}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x916) read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0xffffff7f, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2266.937341] bridge0: port 2(bridge_slave_1) entered blocking state [ 2266.943810] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2266.950615] bridge0: port 1(bridge_slave_0) entered blocking state [ 2266.957053] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2266.966146] device bridge0 entered promiscuous mode [ 2266.974238] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 05:53:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x4c, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2267.102807] bridge0: port 2(bridge_slave_1) entered disabled state [ 2267.109423] bridge0: port 1(bridge_slave_0) entered disabled state [ 2267.116348] device bridge0 left promiscuous mode 05:53:53 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x90000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:53 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d024031ae85717070") syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x10000000000402) write$binfmt_elf32(r1, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 05:53:53 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2267.426545] bridge0: port 2(bridge_slave_1) entered blocking state [ 2267.433006] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2267.439806] bridge0: port 1(bridge_slave_0) entered blocking state [ 2267.446240] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2267.454024] device bridge0 entered promiscuous mode [ 2267.460664] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 05:53:53 executing program 0: socketpair(0x1, 0x8000a, 0x7, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000040)="10c746617360d23f") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) close(r3) close(r2) 05:53:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x34000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x4}, 0xb) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x22) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="ffffff7fdaffffff0402000000000000"], 0x10) [ 2267.536557] __nla_parse: 16 callbacks suppressed [ 2267.536569] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2267.626700] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x5, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:53 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x80000000, 0x400000) execveat(r3, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=[&(0x7f0000000080)='\x00', &(0x7f00000000c0)='em1trustedeth0/\'keyringwlan0+\x00', &(0x7f0000000100)='&proc\x00', &(0x7f0000000140)='\x00'], &(0x7f00000003c0)=[&(0x7f00000001c0)='bdev}]eth0wlan1*vboxnet1\x00', &(0x7f0000000200)='cpusetsystemwlan0md5sum:posix_acl_access\x00', &(0x7f0000000240)='%$vmnet1\'*[-eth0+md5sumuserkeyring\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)='GPL\x00'], 0x1000) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r2) 05:53:53 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x10000000000000, 0x0) fsync(r0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) [ 2267.834163] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2267.862905] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:54 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x400000000000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:54 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000000580)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000340)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$media(&(0x7f00000003c0)='/dev/media#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 2267.945514] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 05:53:54 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x3075}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:54 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x20000, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x100000001, 0x44000) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f0000000100)) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000080)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r5, r5, 0x0, 0x7ffff000) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r6, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, 0x0, 0x0) userfaultfd(0x80800) close(r6) close(r5) 05:53:54 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x200000000000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2268.132633] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7, 0x10800) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0xffff, 0x80) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) [ 2268.181462] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000080)=0x931f) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:54 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:54 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0xffffff7f00000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x127a113e45813ac4) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) r3 = socket(0x10, 0x8000000000000003, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000003020300be0000080300000018020001"], 0x14}}, 0x0) sendmmsg(r3, &(0x7f0000000000), 0x40000000000024a, 0x0) close(r2) close(r1) [ 2268.447250] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2268.500368] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:54 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:54 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x2000000000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2268.684071] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2268.704294] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:53:54 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f0000000000)={0x8080000000000000}) 05:53:55 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x1d4c}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8400204) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000000)=""/138, &(0x7f00000000c0)=0x8a) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(r0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) close(r3) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000100)={0x1, 0x5, 0x1}) close(r2) 05:53:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:55 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x9, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:55 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0xfdffffff00000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:55 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2269.053874] IPVS: length: 138 != 24 05:53:55 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:55 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x25, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2269.166414] IPVS: length: 138 != 24 05:53:55 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x900000000000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) write$FUSE_DIRENT(r0, &(0x7f0000000040)={0x78, 0x0, 0x2, [{0x4, 0xffffffff7fffffff, 0x8, 0x9, 'group_id'}, {0x1, 0x0, 0x8, 0x2d803e67, 'group_id'}, {0x0, 0xfffffffffffffffb, 0x9, 0x7, 'Tppp0\a&{$'}]}, 0x78) 05:53:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0xfffffffffffffffb, 0x1) ioctl$KVM_XEN_HVM_CONFIG(r3, 0x4038ae7a, &(0x7f0000000280)={0xd3b6, 0xfbf, &(0x7f0000000100)="56be5f56f04d14c6ca4e6fef27a322ece1d9d4afb8d5129f662e4b6c8dc5dafd4d02cebcf8e489dc1a5e8e9d02fe8ff8a7f738c83f49aa20a77aeb935a8a3e53903083ec031ab1525558a26c5872533993a543e0af8064ff925b5dfa9048701aa0451d4d0de4bd814bb704bf496e16969d4aff97138738ae89a3c710fcdd7ed813bbbb9fb70b1033ebe7a58f46839a52a9f894cf804a3d8dbb405d6bd4881f07aa0b81b4cca72ca29bf9dee2720dc180b062cbd02f3ffc94610a8e5fbe8a86764ef98589a2e97ffcdc35579850b3db06ea484f", &(0x7f0000000200)="cb9f4da0c6d2efab1f5b9e69dfb8c6b1e6a14261e180eddc297a73faad3ee6a9db43ee999a6cd1bc5dc2db2a7b09b8747b23f7770dd43079508d07b628b16de71cb22439fbf9fe3627b59b2f3e090156efb36c5f07b089805b35b4", 0xd3, 0x5b}) close(r2) close(r1) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x22001, 0x0) mincore(&(0x7f0000012000/0x3000)=nil, 0x3000, &(0x7f00000003c0)=""/230) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r4) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x4, 0x10000) 05:53:55 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:55 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xd01001fa00000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:55 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x5f, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:55 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x300000000000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00407c28715fed9d2c15ab6408ab08298e0e9cd7fe7c3727fe0cd863eb200c5d589a36c5733836a6e48acb8c4f6ef270572e51b2"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) setxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@sha1={0x1, "7260217eb3966c994cc6f8f47885dd12968d640d"}, 0x15, 0x3) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, 0x0, 0x0) close(r2) close(r1) pwrite64(r0, &(0x7f0000000200)="c33b5e025c0b175c65f5d2a0bb73d3594fbde96d95eea44a56a8", 0x1a, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$nl_crypto(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x88000c0}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=@get={0x100, 0x13, 0x200, 0x70bd2a, 0x25dfdbfd, {{'gcm_base(ctr(blowfish),speck64-generic)\x00'}, [], [], 0x2400, 0x2000}, [{0x8, 0x1, 0x80000001}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x5}, {0x8, 0x1, 0x9}]}, 0x100}, 0x1, 0x0, 0x0, 0xc040}, 0x4000) 05:53:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x7c1, 0x424000) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000200)={'syzkaller0\x00', 0x7fff}) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x2400) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) tee(r2, r2, 0x2, 0x8) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="10000000da03ff499afd7f346539e8387e9bf480af9c91ff0400000000000000ab7a9fcf59cb2ce694f254f6f892d1aa00db398ae60faf88d97fdabe78c1fb7d66d385cb3421526ae6819e"], 0x10) 05:53:56 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x33fe0, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) close(r3) r4 = fcntl$dupfd(r3, 0x0, r0) write$P9_RRENAME(r4, &(0x7f0000000000)={0x7, 0x15, 0x1}, 0x7) close(r2) 05:53:56 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x4c000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:56 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00407c28715fed9d2c15ab6408ab08298e0e9cd7fe7c3727fe0cd863eb200c5d589a36c5733836a6e48acb8c4f6ef270572e51b2"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) setxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@sha1={0x1, "7260217eb3966c994cc6f8f47885dd12968d640d"}, 0x15, 0x3) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:56 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x64, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:56 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x10, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:57 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x6c05}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x6c00, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x80808) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000300)={0xaa, 0xc}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x4000, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r4, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x48, r5, 0x30, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x19}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x20}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) fsetxattr$trusted_overlay_redirect(r1, &(0x7f00000003c0)='trusted.overlay.redirect\x00', &(0x7f0000000400)='./file0\x00', 0x8, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_GET_VRING_ENDIAN(r8, 0x4008af14, &(0x7f0000000240)={0x2, 0x9}) accept4$inet(r8, 0x0, &(0x7f0000000340), 0x80000) pselect6(0x40, &(0x7f0000000000)={0xd8, 0x5, 0xffff, 0x10001, 0x7fff, 0x20, 0x1, 0x4}, &(0x7f0000000040)={0x4, 0xfffffffffffffffb, 0x9, 0x6, 0xffffffffffffffe0, 0xffffffff00000001, 0x7379}, &(0x7f0000000080)={0x7, 0x1, 0x2, 0x40, 0x3d7, 0xffffffff918ed1e6, 0x4, 0x3}, &(0x7f0000000100)={r6, r7+30000000}, &(0x7f0000000180)={&(0x7f0000000140)={0xda45}, 0x8}) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) socketpair(0x3, 0x7, 0x4, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) write$P9_RLERROR(r8, &(0x7f0000000280)={0x9, 0x7, 0x1}, 0x9) close(r10) close(r2) bind$inet(r9, &(0x7f00000002c0)={0x2, 0x4e23, @multicast2}, 0x10) 05:53:57 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00407c28715fed9d2c15ab6408ab08298e0e9cd7fe7c3727fe0cd863eb200c5d589a36c5733836a6e48acb8c4f6ef270572e51b2"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) setxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@sha1={0x1, "7260217eb3966c994cc6f8f47885dd12968d640d"}, 0x15, 0x3) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:57 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x7ffff000, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x1ffffd, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000080)=0x100000001) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:57 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x30, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:57 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x7, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0xfffffffd, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:57 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00407c28715fed9d2c15ab6408ab08298e0e9cd7fe7c3727fe0cd863eb200c5d589a36c5733836a6e48acb8c4f6ef270572e51b2"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) setxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@sha1={0x1, "7260217eb3966c994cc6f8f47885dd12968d640d"}, 0x15, 0x3) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) 05:53:57 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x37, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:57 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x9}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x1ffffd, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000080)=0x100000001) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x162) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:57 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0xfffffdef, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x4800000000000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:58 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x200001f4, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:58 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x3f000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000040)={0x21, 0x3, 0x0, {0x4}}, 0x21) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x411c, 0x440800) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000004c0)=""/203) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x162) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:58 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x23, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:58 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00407c28715fed9d2c15ab6408ab08298e0e9cd7fe7c3727fe0cd863eb200c5d589a36c5733836a6e48acb8c4f6ef270572e51b2"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) setxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@sha1={0x1, "7260217eb3966c994cc6f8f47885dd12968d640d"}, 0x15, 0x3) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) 05:53:58 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x7a000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:58 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x6000000000000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000500)=r0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) r1 = dup2(r0, r0) ioctl$VIDIOC_S_FBUF(r1, 0x4030560b, &(0x7f0000000200)={0x12, 0x0, &(0x7f0000000280)="4cc697841df4a681c43bab8120e298e884f6883a1cae1ba2cf210555128e40a92521479637156d4fd3f757b5bd4095787d5845aa8b3b881d8ffd087f68e47ad26d94264c9092f30d98d8a1e744454d7155608f4a889cd23ac6a8abc0785fbd04ee1fed9809c4bcee9d5b656983e0cec76cacdb", {0x5, 0x7fffffff, 0x34363248, 0x0, 0xfffffffffffffff9, 0x9, 0xf, 0x7f}}) socketpair(0x17, 0x0, 0xfffffffffffffffe, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x4, 0xffffffffffff1384, 0xb28}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000340)={r3, @in={{0x2, 0x4e24, @empty}}, 0x1570, 0x3, 0x200, 0x2, 0x20}, 0x98) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000004c0)=0x9, 0x2) 05:53:58 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0xf, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0xffffffffffffffe1) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x1a9, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:58 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0xfdffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:59 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:59 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0xec0, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:59 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x1000000000000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000340)=""/166) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:53:59 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0xc0, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00407c28715fed9d2c15ab6408ab08298e0e9cd7fe7c3727fe0cd863eb200c5d589a36c5733836a6e48acb8c4f6ef270572e51b2"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) setxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@sha1={0x1, "7260217eb3966c994cc6f8f47885dd12968d640d"}, 0x15, 0x3) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) 05:53:59 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x5000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:59 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xb01001fc00000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:53:59 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x63, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:59 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0xfbffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:53:59 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0xf, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:53:59 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x3, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:54:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:54:00 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x5f, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:54:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x80ffffff00000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:54:00 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x67, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:54:00 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:54:00 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00407c28715fed9d2c15ab6408ab08298e0e9cd7fe7c3727fe0cd863eb200c5d589a36c5733836a6e48acb8c4f6ef270572e51b2"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) setxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@sha1={0x1, "7260217eb3966c994cc6f8f47885dd12968d640d"}, 0x15, 0x3) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:54:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) close(r0) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) r1 = accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x4000) timerfd_settime(r2, 0x1, &(0x7f0000000480)={{}, {0x0, 0x1c9c380}}, &(0x7f00000004c0)) getpeername(r1, &(0x7f0000000280)=@nfc_llcp, &(0x7f00000000c0)=0x80) openat$userio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/userio\x00', 0x480c00, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="103aef15b0ffffff0400000000000000df368d0c6d32544845a26e08abb9daf257da61fef60caa857befc1eebb1f7e46b768b5caceec8d2dca584576ab53757fd6a07022d5062cbba35a2c3a8b423c1db3b410499cdffcb8451d8c3474effcd5555672be6dd6e02583e9be989ff0c3e452c09af376ba327ec25aba304f5c9109fe5e929e5067c5a6a2be4c6d62a4e319852bca24dd0c47777306eeaa83e01cf90fe8b20ce10bb974f94159d513c0fd15e2576d4865ea6e7bf2532bf3f310159a000000000000000000000000"], 0x10) 05:54:00 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x9801000000000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:54:00 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0xa, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:54:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x68000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:54:00 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x4800000000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:54:00 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a05f, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2274.717156] __nla_parse: 7 callbacks suppressed [ 2274.717167] netlink: 16 bytes leftover after parsing attributes in process `syz-executor0'. 05:54:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x7a00, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:54:00 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4c1d000000000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) [ 2274.812145] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2274.844145] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:54:01 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a009, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:54:01 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x48, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2275.031363] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2275.062908] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:54:01 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x4c, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:54:01 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00407c28715fed9d2c15ab6408ab08298e0e9cd7fe7c3727fe0cd863eb200c5d589a36c5733836a6e48acb8c4f6ef270572e51b2"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) setxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@sha1={0x1, "7260217eb3966c994cc6f8f47885dd12968d640d"}, 0x15, 0x3) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) [ 2275.250015] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2275.272600] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:54:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f74526f64653d303030303030303030303030c21d0000303034303030302c757361725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:54:01 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x4000000000000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:54:01 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0xffffff80, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:54:01 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x68, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:54:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x7, 0x400100) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f00000000c0)=&(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="10000000daff57ff0400d6aebd06d42c"], 0x10) removexattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=@random={'os2.', '\x00'}) [ 2275.580880] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 2275.618745] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:54:01 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0xffffffff00000000, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:54:01 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x700000000000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:54:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x16, 0x0, 0x0) close(r2) close(r1) [ 2275.809988] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 05:54:02 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x20000000, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:54:02 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x7a00000000000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:54:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay/opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:54:02 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x7000000, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:54:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00407c28715fed9d2c15ab6408ab08298e0e9cd7fe7c3727fe0cd863eb200c5d589a36c5733836a6e48acb8c4f6ef270572e51b2"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) setxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@sha1={0x1, "7260217eb3966c994cc6f8f47885dd12968d640d"}, 0x15, 0x3) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:54:02 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x6c000000}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:54:02 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x40030000000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:54:02 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0xf00000000000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x0, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:54:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='L+\x00', 0xfffffffffffffff8) keyctl$set_timeout(0xf, r1, 0xd5) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:54:02 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x48, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:54:02 executing program 0 (fault-call:10 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000000)={0x79, 0x0, [0x0, 0x3f, 0x800, 0x4]}) getresuid(0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a80)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000600)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000480)=0x2) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000280)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x1, 0x0, [{0x0, 0x3, 0x0, [], 0x1ff}]}}) 05:54:02 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x600000000000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:54:02 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x6, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:54:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xfff, 0x401) write$FUSE_OPEN(r0, &(0x7f0000000080)={0x20, 0xfffffffffffffffe, 0x1, {0x0, 0x6}}, 0x20) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000280)={0x0, 0x1, @raw_data=[0x9, 0x5, 0x100000000, 0x8, 0x3, 0x4, 0x6, 0x4, 0x2, 0x4, 0x1, 0x6, 0xb78f, 0x85d, 0x200, 0x21]}) 05:54:03 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x700, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:54:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000000)={0x79, 0x0, [0x0, 0x3f, 0x800, 0x4]}) getresuid(0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a80)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000600)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000480)=0x2) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000280)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x1, 0x0, [{0x0, 0x3, 0x0, [], 0x1ff}]}}) 05:54:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00407c28715fed9d2c15ab6408ab08298e0e9cd7fe7c3727fe0cd863eb200c5d589a36c5733836a6e48acb8c4f6ef270572e51b2"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:54:03 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x128cdf3ec32}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 05:54:03 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x7a000000, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:54:03 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x4c00, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:54:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x8000, 0x1}}, 0x30) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000340)=0xc) r3 = getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) r5 = getgid() lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x8, &(0x7f0000000580)=[0xee00, 0xee01, 0xee01, 0x0, 0xee00, 0xee00, 0x0, 0xee00]) r8 = getegid() lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000005c0)={{}, {}, [{0x2, 0x3, r1}, {0x2, 0x6, r2}], {}, [{0x8, 0x7, r3}, {0x8, 0x0, r4}, {0x8, 0x6, r5}, {0x8, 0x4, r6}, {0x8, 0x5, r7}, {0x8, 0x7, r8}], {0x10, 0x2}, {0x20, 0x4}}, 0x64, 0x1) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:54:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00407c28715fed9d2c15ab6408ab08298e0e9cd7fe7c3727fe0cd863eb200c5d589a36c5733836a6e48acb8c4f6ef270572e51b2"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 05:54:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000000)={0x79, 0x0, [0x0, 0x3f, 0x800, 0x4]}) getresuid(0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a80)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000600)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000480)=0x2) ioctl$KVM_RUN(r2, 0x8004ae98, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000280)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x1, 0x0, [{0x0, 0x3, 0x0, [], 0x1ff}]}}) 05:54:03 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x9effffff, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) 05:54:03 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x6c, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) 05:54:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00407c28715fed9d2c15ab6408ab08298e0e9cd7fe7c3727fe0cd863eb200c5d589a36c5733836a6e48acb8c4f6ef270572e51b2"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) [ 2277.602725] kasan: CONFIG_KASAN_INLINE enabled [ 2277.615764] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 2277.662430] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 2277.663745] kobject: 'kvm' (0000000014f4b34b): kobject_uevent_env [ 2277.668699] CPU: 0 PID: 14503 Comm: syz-executor2 Not tainted 4.20.0-rc5-next-20181207+ #163 [ 2277.668710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2277.668734] RIP: 0010:fuse_dev_do_write+0x1dc2/0x3820 [ 2277.668752] Code: 00 48 c1 e0 2a 80 3c 02 00 0f 85 e9 17 00 00 49 8b 9d 58 01 00 00 b8 ff ff 37 00 48 c1 e0 2a 48 8d 7b 04 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 8f [ 2277.668762] RSP: 0018:ffff8881bc8374b8 EFLAGS: 00010247 [ 2277.668775] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90007be5000 [ 2277.668785] RDX: 0000000000000000 RSI: ffffffff828c5823 RDI: 0000000000000004 [ 2277.668802] RBP: ffff8881bc837a50 R08: ffff8881b4a9e580 R09: ffffed1030d62082 [ 2277.744261] R10: ffffed1030d62082 R11: ffff888186b10413 R12: 0000000000000000 [ 2277.751539] R13: ffff888186b103f0 R14: 0000000000000000 R15: 0000000000000030 [ 2277.758823] FS: 00007f1572bc2700(0000) GS:ffff8881dac00000(0000) knlGS:0000000000000000 [ 2277.767147] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2277.773038] CR2: 0000000000000000 CR3: 00000001b6872000 CR4: 00000000001426f0 [ 2277.780322] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2277.787598] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2277.794926] Call Trace: [ 2277.797531] ? _raw_spin_unlock_irqrestore+0xbb/0xd0 [ 2277.802660] ? fuse_dev_read+0x250/0x250 [ 2277.806732] ? mark_held_locks+0x130/0x130 [ 2277.810989] ? mark_held_locks+0x130/0x130 [ 2277.815262] ? futex_wake+0x613/0x760 [ 2277.819082] ? lock_downgrade+0x900/0x900 [ 2277.823273] ? kasan_check_read+0x11/0x20 [ 2277.827434] ? print_usage_bug+0xc0/0xc0 [ 2277.831507] ? do_raw_spin_trylock+0x270/0x270 [ 2277.836107] ? print_usage_bug+0xc0/0xc0 [ 2277.840182] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 2277.845407] ? graph_lock+0x270/0x270 [ 2277.849236] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 2277.854357] ? futex_wake+0x304/0x760 [ 2277.858177] ? graph_lock+0x270/0x270 [ 2277.862015] ? find_held_lock+0x36/0x1c0 [ 2277.866098] ? aa_file_perm+0x469/0x1060 [ 2277.870177] ? lock_downgrade+0x900/0x900 [ 2277.874359] ? check_preemption_disabled+0x48/0x280 [ 2277.879399] ? kasan_check_read+0x11/0x20 [ 2277.883560] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2277.888848] ? rcu_read_unlock_special+0x370/0x370 [ 2277.893799] ? aa_file_perm+0x490/0x1060 [ 2277.897880] ? aa_path_link+0x5e0/0x5e0 [ 2277.901867] ? __fget+0x4d1/0x740 [ 2277.905336] ? memset+0x31/0x40 [ 2277.908633] fuse_dev_write+0x19a/0x240 [ 2277.912621] ? fuse_dev_splice_write+0xe70/0xe70 [ 2277.917390] ? __save_stack_trace+0x8d/0xf0 [ 2277.921745] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2277.927295] ? iov_iter_init+0xe5/0x210 [ 2277.931286] __vfs_write+0x72c/0xab0 [ 2277.935015] ? kernel_read+0x120/0x120 [ 2277.938920] ? trace_hardirqs_off_caller+0x310/0x310 [ 2277.944043] ? apparmor_file_permission+0x24/0x30 [ 2277.948904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2277.954505] ? rw_verify_area+0x118/0x360 [ 2277.958715] vfs_write+0x1fc/0x580 [ 2277.962285] ksys_write+0x101/0x260 [ 2277.965932] ? __ia32_sys_read+0xb0/0xb0 [ 2277.970010] ? trace_hardirqs_off_caller+0x310/0x310 [ 2277.975134] __x64_sys_write+0x73/0xb0 [ 2277.979040] do_syscall_64+0x1b9/0x820 [ 2277.982941] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2277.988323] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2277.993282] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2277.998139] ? trace_hardirqs_on_caller+0x310/0x310 [ 2278.003225] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2278.008269] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2278.013304] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2278.018167] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2278.023368] RIP: 0033:0x457659 [ 2278.026575] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2278.045486] RSP: 002b:00007f1572bc1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2278.053203] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457659 [ 2278.060502] RDX: 0000000000000030 RSI: 0000000020000040 RDI: 0000000000000003 [ 2278.067780] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2278.075059] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1572bc26d4 [ 2278.082335] R13: 00000000004c57de R14: 00000000004d9730 R15: 00000000ffffffff [ 2278.089670] Modules linked in: [ 2278.096998] kobject: 'kvm' (0000000014f4b34b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2278.103379] ---[ end trace 38f8cb73e2a80f09 ]--- [ 2278.111675] RIP: 0010:fuse_dev_do_write+0x1dc2/0x3820 [ 2278.119843] kobject: 'kvm' (0000000014f4b34b): kobject_uevent_env [ 2278.131850] kobject: 'kvm' (0000000014f4b34b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2278.139159] Code: 00 48 c1 e0 2a 80 3c 02 00 0f 85 e9 17 00 00 49 8b 9d 58 01 00 00 b8 ff ff 37 00 48 c1 e0 2a 48 8d 7b 04 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 8f [ 2278.160256] kobject: '0:37' (00000000aa19431a): kobject_uevent_env [ 2278.168668] kobject: '0:37' (00000000aa19431a): fill_kobj_path: path = '/devices/virtual/bdi/0:37' [ 2278.192526] kobject: '0:37' (00000000aa19431a): kobject_cleanup, parent (null) [ 2278.195834] RSP: 0018:ffff8881bc8374b8 EFLAGS: 00010247 [ 2278.204302] kobject: 'kvm' (0000000014f4b34b): kobject_uevent_env 05:54:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000000)={0x79, 0x0, [0x0, 0x3f, 0x800, 0x4]}) getresuid(0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a80)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000600)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000480)=0x2) ioctl$KVM_RUN(r2, 0x5421, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000280)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x1, 0x0, [{0x0, 0x3, 0x0, [], 0x1ff}]}}) [ 2278.213621] kobject: 'kvm' (0000000014f4b34b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2278.222995] kobject: '0:37' (00000000aa19431a): calling ktype release [ 2278.231157] kobject: '0:37': free name [ 2278.246564] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90007be5000 05:54:04 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x68, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2278.259509] kobject: 'loop5' (0000000081d2f725): kobject_uevent_env [ 2278.266456] kobject: 'loop5' (0000000081d2f725): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2278.278729] RDX: 0000000000000000 RSI: ffffffff828c5823 RDI: 0000000000000004 [ 2278.292968] kobject: 'kvm' (0000000014f4b34b): kobject_uevent_env [ 2278.308454] kobject: 'kvm' (0000000014f4b34b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2278.317767] kobject: 'loop3' (00000000a2592797): kobject_uevent_env [ 2278.334527] kobject: 'loop3' (00000000a2592797): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2278.339304] kobject: '0:37' (00000000cac5a34b): kobject_add_internal: parent: 'bdi', set: 'devices' 05:54:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x34, 0x2d, 0xd15bb7181b25a043, 0x10000000, 0x0, {}, [@nested={0x20, 0x0, [@generic="972c15e5c911c749c4b67cdc8162e72b0faa66ebab87eeb310"]}]}, 0x34}}, 0x0) [ 2278.361120] RBP: ffff8881bc837a50 R08: ffff8881b4a9e580 R09: ffffed1030d62082 [ 2278.382131] kobject: 'kvm' (0000000014f4b34b): kobject_uevent_env [ 2278.382160] kobject: 'kvm' (0000000014f4b34b): kobject_uevent_env [ 2278.392308] kobject: '0:48' (0000000078e6e8a8): kobject_add_internal: parent: 'bdi', set: 'devices' [ 2278.401756] kobject: 'loop1' (0000000028c46122): kobject_uevent_env 05:54:04 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgid() stat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)="737973525ff4ef281d0000000000000000000000", 0x0, 0x66, 0x2) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000100)={0x9, 0x6, 0x80000001, 0x4}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x6c}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) [ 2278.408699] kobject: 'kvm' (0000000014f4b34b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2278.423549] kobject: 'loop1' (0000000028c46122): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2278.427741] kobject: '0:48' (0000000078e6e8a8): kobject_uevent_env [ 2278.440493] kobject: '0:37' (00000000cac5a34b): kobject_uevent_env [ 2278.446881] kobject: 'loop4' (00000000c61c4ddf): kobject_uevent_env [ 2278.446913] kobject: 'loop4' (00000000c61c4ddf): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2278.456551] kobject: 'kvm' (0000000014f4b34b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2278.473189] R10: ffffed1030d62082 R11: ffff888186b10413 R12: 0000000000000000 [ 2278.489406] R13: ffff888186b103f0 R14: 0000000000000000 R15: 0000000000000030 [ 2278.498577] kobject: '0:37' (00000000cac5a34b): fill_kobj_path: path = '/devices/virtual/bdi/0:37' 05:54:04 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00001dcf48)={0x2, 0x500000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x500000000000000, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x78}}, 0x0) [ 2278.515463] kobject: '0:48' (0000000078e6e8a8): fill_kobj_path: path = '/devices/virtual/bdi/0:48' [ 2278.537455] FS: 00007f1572bc2700(0000) GS:ffff8881dad00000(0000) knlGS:0000000000000000 [ 2278.547468] kobject: 'loop3' (00000000a2592797): kobject_uevent_env [ 2278.557161] kobject: 'loop3' (00000000a2592797): fill_kobj_path: path = '/devices/virtual/block/loop3' 05:54:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00407c28715fed9d2c15ab6408ab08298e0e9cd7fe7c3727fe0cd863eb200c5d589a36c5733836a6e48acb8c4f6ef270572e51b2"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=@sha1={0x1, "7260217eb3966c994cc6f8f47885dd12968d640d"}, 0x15, 0x3) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)={0x10, 0xffffffffffffffda, 0x4}, 0x10) [ 2278.569659] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2278.570326] kobject: '0:48' (0000000078e6e8a8): kobject_uevent_env [ 2278.583668] CR2: 0000001b32324000 CR3: 00000001b6872000 CR4: 00000000001426e0 [ 2278.584393] kobject: 'kvm' (0000000014f4b34b): kobject_uevent_env [ 2278.597305] kobject: '0:48' (0000000078e6e8a8): fill_kobj_path: path = '/devices/virtual/bdi/0:48' [ 2278.606918] kobject: '0:37' (00000000cac5a34b): kobject_uevent_env [ 2278.607659] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2278.617596] kobject: 'kvm' (0000000014f4b34b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2278.621768] kobject: '0:48' (0000000078e6e8a8): kobject_cleanup, parent (null) [ 2278.638544] kobject: '0:37' (00000000cac5a34b): fill_kobj_path: path = '/devices/virtual/bdi/0:37' [ 2278.652681] kobject: '0:37' (00000000cac5a34b): kobject_cleanup, parent (null) [ 2278.664379] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2278.672021] kobject: '0:37' (00000000cac5a34b): calling ktype release [ 2278.680202] Kernel panic - not syncing: Fatal exception [ 2278.686917] Kernel Offset: disabled [ 2278.690550] Rebooting in 86400 seconds..