[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 105.680631] audit: type=1800 audit(1551954532.729:25): pid=11773 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 105.699849] audit: type=1800 audit(1551954532.729:26): pid=11773 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 105.719310] audit: type=1800 audit(1551954532.749:27): pid=11773 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.88' (ECDSA) to the list of known hosts. 2019/03/07 10:29:09 fuzzer started 2019/03/07 10:29:14 dialing manager at 10.128.0.26:34047 2019/03/07 10:29:14 syscalls: 1 2019/03/07 10:29:14 code coverage: enabled 2019/03/07 10:29:14 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/03/07 10:29:14 extra coverage: extra coverage is not supported by the kernel 2019/03/07 10:29:14 setuid sandbox: enabled 2019/03/07 10:29:14 namespace sandbox: enabled 2019/03/07 10:29:14 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/07 10:29:14 fault injection: enabled 2019/03/07 10:29:14 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/07 10:29:14 net packet injection: enabled 2019/03/07 10:29:14 net device setup: enabled 10:32:00 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0x7ffff, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="adbe3efd19c3aaaaaaaaaabb9100310081000100000d010000800702000059d091a203941ddcbd069764464fc483ea66382efe113ea3a863e6e096ec8fd1df7358676c7229c7885a2aea8a8377637a72c25a903842e0c5193ad47a151a00"], 0x0) syzkaller login: [ 294.489341] IPVS: ftp: loaded support on port[0] = 21 [ 294.652319] chnl_net:caif_netlink_parms(): no params data found [ 294.725649] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.732269] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.740827] device bridge_slave_0 entered promiscuous mode [ 294.750565] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.757176] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.765809] device bridge_slave_1 entered promiscuous mode [ 294.801052] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 294.812634] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 294.846900] team0: Port device team_slave_0 added [ 294.855806] team0: Port device team_slave_1 added [ 295.037178] device hsr_slave_0 entered promiscuous mode [ 295.202889] device hsr_slave_1 entered promiscuous mode [ 295.417010] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.423639] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.430811] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.437438] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.534029] 8021q: adding VLAN 0 to HW filter on device bond0 [ 295.558071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 295.570107] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.579878] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.590893] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 295.612209] 8021q: adding VLAN 0 to HW filter on device team0 [ 295.630428] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 295.639197] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.645770] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.683526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 295.692256] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 295.700633] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.707184] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.716063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 295.725739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 295.735305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 295.744624] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 295.753655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 295.762863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 295.776333] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 295.784372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 295.792781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 295.808831] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 295.821178] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 295.830565] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 295.839080] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 295.884145] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 296.262561] protocol 88fb is buggy, dev hsr_slave_0 [ 296.268050] protocol 88fb is buggy, dev hsr_slave_1 10:32:03 executing program 0: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x86138) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0x68, &(0x7f0000000180)={{}, {0x18, 0x3}, 0x8}, 0x287) r0 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) write(r0, &(0x7f0000000040)="670dc3", 0x3) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) 10:32:03 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x3, &(0x7f0000000000)=""/187, 0xbb) 10:32:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'ip_vti0\x00\x1e\x00', 0x800201e}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@dev, 0x0, r2}) sendto(r0, 0x0, 0x0, 0x48800, &(0x7f0000000000)=@generic={0xa, "a268d051afbb30b9923e133c4f56259c85a08979aa34c5e1f0eb820d62d5b0cc4faf74f741cba4496bcce0b430f1a59cf4b0969164bfc3019718e2cecf7aea450e50c1f6c3411889c8b9aefdcf069642a4897d1ae6f8749697df253a8bcfae046f8b9741ca762548255274875d3f737894f8e5c23221b0087c41ad03467a"}, 0x80) dup2(r0, r1) write(r0, 0x0, 0x0) 10:32:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'ip_vti0\x00\x1e\x00', 0x800201e}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c61, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={@dev, 0x0, r2}) sendto(r0, 0x0, 0x0, 0x48800, &(0x7f0000000000)=@generic={0xa, "a268d051afbb30b9923e133c4f56259c85a08979aa34c5e1f0eb820d62d5b0cc4faf74f741cba4496bcce0b430f1a59cf4b0969164bfc3019718e2cecf7aea450e50c1f6c3411889c8b9aefdcf069642a4897d1ae6f8749697df253a8bcfae046f8b9741ca762548255274875d3f737894f8e5c23221b0087c41ad03467a"}, 0x80) write(r0, 0x0, 0x0) 10:32:04 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={@loopback, @initdev, @initdev, 0x0, 0x0, 0x0, 0x0, 0x3}) 10:32:04 executing program 0: r0 = syz_open_dev$media(&(0x7f0000002900)='/dev/media#\x00', 0x4, 0x100) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000002940)='/dev/null\x00', 0x0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000002980)={0x0, r1}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000002840)='/dev/sequencer2\x00', 0xfffffffffffffffd, 0x0) r3 = shmget(0x1, 0x3000, 0x10, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_STAT(r3, 0x2, &(0x7f00000029c0)) write$UHID_INPUT2(r0, &(0x7f00000029c0)={0xc, 0x1000, "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"}, 0x1006) recvmmsg(r2, &(0x7f00000026c0)=[{{&(0x7f0000000080)=@caif, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000100)=""/179, 0xb3}, {&(0x7f00000001c0)=""/148, 0x94}, {&(0x7f0000000280)=""/243, 0xf3}, {&(0x7f0000000380)=""/201, 0xc9}, {&(0x7f0000000480)=""/21, 0x15}, {&(0x7f00000004c0)=""/52, 0x34}, {&(0x7f0000000500)=""/19, 0x13}, {&(0x7f0000000540)=""/103, 0x67}], 0x8, &(0x7f0000000640)=""/241, 0xf1}, 0x1000}, {{&(0x7f0000000740)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000001c40)=[{&(0x7f00000007c0)=""/215, 0xd7}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f0000000b80)=""/4096, 0x1000}, {&(0x7f00000009c0)=""/123, 0x7b}, {&(0x7f0000000a40)=""/213, 0xd5}, {&(0x7f0000001b80)=""/139, 0x8b}], 0x6, &(0x7f0000001cc0)=""/193, 0xc1}, 0x6}, {{&(0x7f0000001dc0)=@sco, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001e40)=""/146, 0x92}, {&(0x7f0000001f00)=""/37, 0x25}], 0x2, &(0x7f0000001f80)=""/229, 0xe5}, 0x1}, {{&(0x7f0000002080)=@ax25={{}, [@default, @rose, @rose, @bcast, @null, @default, @bcast]}, 0x80, &(0x7f0000002400)=[{&(0x7f0000002100)=""/32, 0x20}, {&(0x7f0000002140)=""/171, 0xab}, {&(0x7f0000002200)=""/196, 0xc4}, {&(0x7f0000002300)=""/255, 0xff}], 0x4, &(0x7f0000002440)=""/118, 0x76}, 0x7}, {{&(0x7f00000024c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000002680)=[{&(0x7f0000002540)=""/228, 0xe4}, {&(0x7f0000002640)=""/45, 0x2d}], 0x2}, 0xd145}], 0x5, 0x100, 0x0) shmget(0x3, 0x3000, 0x1, &(0x7f0000ffb000/0x3000)=nil) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000002880)={'filter\x00'}, &(0x7f0000000000)=0x54) capset(&(0x7f0000000b40)={0x20080522}, &(0x7f0000000040)) ioprio_set$uid(0x3, 0x0, 0x3) write$P9_RMKDIR(r2, &(0x7f0000002800)={0x14, 0x49, 0x2, {0x81, 0x1, 0x5}}, 0x14) 10:32:04 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x7fff, 0x602) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) r1 = socket$inet6(0xa, 0x7fffe, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f00000000c0)={0x40000000}) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @ipv4={[], [], @rand_addr=0x8}}, 0x1c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) sched_setattr(r2, &(0x7f0000000180)={0x30, 0x2, 0x1, 0x4, 0x4, 0x401, 0xffffffffffffffff, 0x1}, 0x0) 10:32:04 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000000)={0x0, 0x300e}) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000080)=0x2) 10:32:04 executing program 0: unshare(0x20400) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x18000, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000140)={{0xffffffffffffffff, 0x3, 0x101, 0x2, 0x20}, 0x401, 0x1fe00000}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0x40045108, &(0x7f00000000c0)={{}, {0x0, 0x1a0ffffffff}}) 10:32:04 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='cmdline\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}, 0x4}], 0x1, 0x0, 0x0) mq_notify(r0, &(0x7f00000000c0)={0x0, 0x40, 0x1, @thr={&(0x7f0000000000)="ab27dbea61f7816ef777bdadb32b357e21562837e6e8f36f1c5112abda7f24171e44411178d8e14505c49806600957aff49b6bd1c714066aea3eb158ef1cd10bb4510756ac2ffa8003802068e56a0fe4e8cffd8b970faa95c4df9fe83cf7ada4cc27d8685e7a5b6ed1e8a6c197ca026cae696b7fc1df517996fb04bdee4e3edb9f545e782ba7", &(0x7f00000005c0)="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"}}) fanotify_init(0x0, 0x109000) syz_extract_tcp_res(&(0x7f0000000100)={0x41424344, 0x41424344}, 0x7f, 0x1) syz_extract_tcp_res$synack(&(0x7f0000000380)={0x41424344}, 0x1, 0x0) syz_emit_ethernet(0x13e, &(0x7f00000003c0)=ANY=[@ANYBLOB="d39f7ebc32dbaaaaaaaaaaaa810049008847ff00000000000040800000000000007000000000ff00000000006e0064c1b91000e83e00fe80000000000000b708e7ddaf00000000000000bbfe88807b6caab900000000000000000000000001010002040100200900f531d8b3cf2797a76377da9fbbd862183513887aa6827969fc68dced88f494cb5ef3825f6fbbb07dece45e450629ca04156fb102f0a1c2e4ae1a25e0094d3e2c", @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="506800db907803ff1312dd41114c61b0e421b32e7114b51dc34813124b1d8964ff8f2e320e92061f60dd6bca030300051600000040000000090000000500000004000000050000000460d3f6e808cead52a0be6c68283781b3414510a9de7cc05db06f30c4290f7d2942610a7b628330531380d0160c3f985552889925d1e5a6b419dba0e9ce2861829fcc5e3a75a3547144bca3ff2688f275650c938586a55e63ed5890bac305e787342a87e9504297f1b1adea1a0786f87fd4b80e8a0080c2aeadc7b8"], &(0x7f0000000300)={0x0, 0x3, [0xbd5, 0xaa5, 0xb8d, 0x272]}) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000140)) 10:32:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1, 0x511000) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000140)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = syz_open_procfs(0x0, &(0x7f0000001040)='net/tcp6\x00') readv(r2, &(0x7f0000000100)=[{&(0x7f0000000300)=""/112, 0x70}, {&(0x7f0000000080)=""/42, 0x3a5}], 0x2) 10:32:04 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = geteuid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r2, r3) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 297.883329] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. [ 297.898124] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:05 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = geteuid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r2, r3) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:05 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = geteuid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r2, r3) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 298.008895] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:05 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = geteuid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r2, r3) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 298.139414] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:05 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) geteuid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 298.239227] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:05 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) geteuid() sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 298.340378] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:05 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = geteuid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r2, r3) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 298.455076] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:05 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 298.686020] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:05 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 298.918962] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. [ 298.957930] IPVS: ftp: loaded support on port[0] = 21 10:32:06 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 299.133124] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. [ 299.143020] chnl_net:caif_netlink_parms(): no params data found 10:32:06 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 299.220989] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.227682] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.236091] device bridge_slave_0 entered promiscuous mode [ 299.246830] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.253399] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.261857] device bridge_slave_1 entered promiscuous mode [ 299.302664] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 299.314308] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 299.351227] team0: Port device team_slave_0 added [ 299.360992] team0: Port device team_slave_1 added 10:32:06 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 299.437049] device hsr_slave_0 entered promiscuous mode [ 299.503506] device hsr_slave_1 entered promiscuous mode 10:32:06 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 299.609457] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.616100] bridge0: port 2(bridge_slave_1) entered forwarding state [ 299.623372] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.629906] bridge0: port 1(bridge_slave_0) entered forwarding state 10:32:06 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 299.800336] 8021q: adding VLAN 0 to HW filter on device bond0 [ 299.828692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 299.838337] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.853159] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.874433] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 299.895673] 8021q: adding VLAN 0 to HW filter on device team0 [ 299.916906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 299.925243] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.931820] bridge0: port 1(bridge_slave_0) entered forwarding state 10:32:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 299.987865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 299.996744] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.003329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 300.013348] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 300.022551] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 300.031242] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 300.052825] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 300.064758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 10:32:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 300.118617] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 300.130639] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 300.139280] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 10:32:07 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = geteuid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r2, r3) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:07 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = geteuid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r2, r3) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:07 executing program 0: r0 = socket$kcm(0x10, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:07 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = geteuid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r2, r3) 10:32:07 executing program 0: r0 = socket$kcm(0x10, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:08 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) geteuid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) 10:32:08 executing program 0: r0 = socket$kcm(0x10, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:08 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) geteuid() 10:32:08 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:08 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:08 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:08 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:08 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) 10:32:08 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:08 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) 10:32:08 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) 10:32:09 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:09 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) 10:32:09 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) 10:32:09 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) 10:32:09 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:09 executing program 1: r0 = socket$kcm(0x10, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:09 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:09 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:09 executing program 1: r0 = socket$kcm(0x10, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) [ 302.938673] __nla_parse: 17 callbacks suppressed [ 302.938696] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:10 executing program 1: r0 = socket$kcm(0x10, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:10 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:10 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) [ 303.190362] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:10 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:10 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:10 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) [ 303.453374] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:10 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:10 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) [ 303.646167] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:10 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:10 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) [ 303.844571] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:11 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:11 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) [ 304.069094] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:11 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:11 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 304.277472] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:11 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:11 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) [ 304.468268] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:11 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:11 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) [ 304.655397] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:11 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:11 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:11 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) [ 304.914418] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:12 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:12 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:12 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:12 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:12 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:12 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:12 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:12 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:12 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:12 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:12 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:12 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:13 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:13 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:13 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:13 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:13 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:13 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:13 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:13 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:13 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:13 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:14 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:14 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:14 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:14 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:14 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 307.334962] IPVS: ftp: loaded support on port[0] = 21 10:32:14 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:14 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 307.625498] chnl_net:caif_netlink_parms(): no params data found [ 307.720625] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.727312] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.735966] device bridge_slave_0 entered promiscuous mode [ 307.751440] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.758318] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.766855] device bridge_slave_1 entered promiscuous mode [ 307.806068] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 307.826142] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 307.866611] team0: Port device team_slave_0 added [ 307.878899] team0: Port device team_slave_1 added [ 307.958183] device hsr_slave_0 entered promiscuous mode [ 307.982290] device hsr_slave_1 entered promiscuous mode [ 308.045765] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.052376] bridge0: port 2(bridge_slave_1) entered forwarding state [ 308.059553] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.066204] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.157499] 8021q: adding VLAN 0 to HW filter on device bond0 [ 308.183631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 308.195544] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.204111] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.218112] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 308.238428] 8021q: adding VLAN 0 to HW filter on device team0 [ 308.258276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 308.267125] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.273714] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.326773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 308.335268] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.341936] bridge0: port 2(bridge_slave_1) entered forwarding state [ 308.351972] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 308.361220] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 308.389248] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 308.399064] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 308.437319] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 308.445731] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 308.454631] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 308.473585] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 308.499473] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 308.584880] __nla_parse: 14 callbacks suppressed [ 308.584903] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 10:32:15 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:15 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:15 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:15 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) [ 308.744181] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. [ 308.761187] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 10:32:15 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:15 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:16 executing program 1: socket$kcm(0x10, 0x800000000002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) [ 309.020604] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 309.067496] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:16 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:16 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:16 executing program 1: socket$kcm(0x10, 0x800000000002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) [ 309.352306] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 10:32:16 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:16 executing program 2: r0 = socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) 10:32:16 executing program 1: socket$kcm(0x10, 0x800000000002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) 10:32:16 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:16 executing program 2: socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:16 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) 10:32:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:17 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, 0x0, 0x0) 10:32:17 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) 10:32:17 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) 10:32:17 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) 10:32:17 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, 0x0, 0x0) 10:32:17 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, 0x0, 0x0) 10:32:17 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) 10:32:17 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) 10:32:17 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) 10:32:17 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) 10:32:17 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 10:32:17 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) 10:32:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:18 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 10:32:18 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = geteuid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r2, r3) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:18 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 311.263145] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 10:32:18 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080), 0x0) 10:32:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:18 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = geteuid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r2, r3) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 311.522981] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 10:32:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:18 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080), 0x0) 10:32:18 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = geteuid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r2, r3) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:18 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080), 0x0) [ 311.859061] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 10:32:19 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 10:32:19 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = geteuid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r2, r3) 10:32:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:19 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 10:32:19 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) geteuid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) 10:32:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:19 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 10:32:19 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) geteuid() 10:32:19 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x1}, 0x0) 10:32:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:19 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:19 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x1}, 0x0) 10:32:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:20 executing program 1: socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:20 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x1}, 0x0) 10:32:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:20 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b0000", 0x17}], 0x1}, 0x0) 10:32:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:20 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 10:32:20 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b0000", 0x17}], 0x1}, 0x0) 10:32:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:20 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 10:32:21 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b0000", 0x17}], 0x1}, 0x0) 10:32:21 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 10:32:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:21 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff000080", 0x23}], 0x1}, 0x0) 10:32:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:21 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff000080", 0x23}], 0x1}, 0x0) 10:32:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:21 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff000080", 0x23}], 0x1}, 0x0) 10:32:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:22 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff000080000000000000", 0x29}], 0x1}, 0x0) 10:32:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:22 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff000080000000000000", 0x29}], 0x1}, 0x0) 10:32:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:22 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff000080000000000000", 0x29}], 0x1}, 0x0) 10:32:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:22 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff000080000000000000000000", 0x2c}], 0x1}, 0x0) 10:32:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) 10:32:23 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff000080000000000000000000", 0x2c}], 0x1}, 0x0) 10:32:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:23 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff000080000000000000000000", 0x2c}], 0x1}, 0x0) 10:32:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) 10:32:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) 10:32:23 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff00008000000000000000000000", 0x2d}], 0x1}, 0x0) 10:32:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:23 executing program 2 (fault-call:0 fault-nth:0): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 316.679180] FAULT_INJECTION: forcing a failure. [ 316.679180] name failslab, interval 1, probability 0, space 0, times 1 [ 316.690720] CPU: 0 PID: 12586 Comm: syz-executor.2 Not tainted 5.0.0+ #11 [ 316.697704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.707126] Call Trace: [ 316.709792] dump_stack+0x173/0x1d0 [ 316.713478] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 316.718735] should_fail+0xa19/0xb20 [ 316.722535] __should_failslab+0x278/0x2a0 [ 316.726836] should_failslab+0x29/0x70 [ 316.730799] kmem_cache_alloc_node_trace+0x13e/0xc70 [ 316.735957] ? __get_vm_area_node+0x2b6/0x7f0 [ 316.740523] ? mntput_no_expire+0x93/0x1800 [ 316.744909] __get_vm_area_node+0x2b6/0x7f0 [ 316.749299] __vmalloc_node_range+0x315/0x13a0 [ 316.753930] ? bpf_prog_alloc+0xe3/0x5a0 [ 316.758064] __vmalloc+0xe2/0x100 [ 316.761577] ? bpf_prog_alloc+0xe3/0x5a0 [ 316.765697] bpf_prog_alloc+0xe3/0x5a0 [ 316.769652] __do_sys_bpf+0x6b2f/0x113d0 [ 316.773793] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 316.779211] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 316.784467] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 316.789719] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 316.795221] ? prepare_exit_to_usermode+0x114/0x420 [ 316.800293] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 316.805567] __se_sys_bpf+0x8e/0xa0 [ 316.809346] __x64_sys_bpf+0x4a/0x70 [ 316.813115] do_syscall_64+0xbc/0xf0 [ 316.816894] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 316.822151] RIP: 0033:0x457f29 [ 316.825392] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.844393] RSP: 002b:00007f658dd31c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 316.852177] RAX: ffffffffffffffda RBX: 00007f658dd31c90 RCX: 0000000000457f29 [ 316.860052] RDX: 0000000000000048 RSI: 00000000200000c0 RDI: 0000000000000005 [ 316.867413] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 316.874729] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f658dd326d4 [ 316.882049] R13: 00000000004be26f R14: 00000000004ce8c0 R15: 0000000000000003 [ 316.889774] syz-executor.2: vmalloc: allocation failure: 4096 bytes, mode:0x6280c0(GFP_USER|__GFP_ZERO), nodemask=(null),cpuset=syz2,mems_allowed=0-1 [ 316.903559] CPU: 0 PID: 12586 Comm: syz-executor.2 Not tainted 5.0.0+ #11 [ 316.910554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.919950] Call Trace: [ 316.922628] dump_stack+0x173/0x1d0 [ 316.926332] warn_alloc+0x4eb/0x710 [ 316.930109] __vmalloc_node_range+0x1f4/0x13a0 [ 316.934789] __vmalloc+0xe2/0x100 [ 316.938302] ? bpf_prog_alloc+0xe3/0x5a0 [ 316.942421] bpf_prog_alloc+0xe3/0x5a0 [ 316.946387] __do_sys_bpf+0x6b2f/0x113d0 [ 316.950555] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 316.955979] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 316.961255] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 316.966509] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 316.972043] ? prepare_exit_to_usermode+0x114/0x420 [ 316.977120] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 316.982392] __se_sys_bpf+0x8e/0xa0 [ 316.986108] __x64_sys_bpf+0x4a/0x70 [ 316.989887] do_syscall_64+0xbc/0xf0 [ 316.994116] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 316.999346] RIP: 0033:0x457f29 [ 317.002593] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 317.021560] RSP: 002b:00007f658dd31c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 317.029337] RAX: ffffffffffffffda RBX: 00007f658dd31c90 RCX: 0000000000457f29 [ 317.036657] RDX: 0000000000000048 RSI: 00000000200000c0 RDI: 0000000000000005 [ 317.043970] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 317.051283] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f658dd326d4 [ 317.058608] R13: 00000000004be26f R14: 00000000004ce8c0 R15: 0000000000000003 [ 317.067082] Mem-Info: [ 317.069632] active_anon:76092 inactive_anon:187 isolated_anon:0 [ 317.069632] active_file:7450 inactive_file:26909 isolated_file:0 [ 317.069632] unevictable:0 dirty:57 writeback:0 unstable:0 [ 317.069632] slab_reclaimable:4068 slab_unreclaimable:9386 [ 317.069632] mapped:32236 shmem:244 pagetables:662 bounce:0 [ 317.069632] free:1012816 free_pcp:1074 free_cma:0 [ 317.103622] Node 0 active_anon:304356kB inactive_anon:752kB active_file:29668kB inactive_file:107652kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:128836kB dirty:224kB writeback:0kB shmem:976kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 196608kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 317.132110] Node 1 active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 10:32:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 317.158108] Node 0 DMA free:15904kB min:212kB low:264kB high:316kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 317.184622] lowmem_reserve[]: 0 2800 3490 3490 [ 317.189294] Node 0 DMA32 free:929980kB min:38380kB low:47972kB high:57564kB active_anon:300368kB inactive_anon:48kB active_file:20280kB inactive_file:103368kB unevictable:0kB writepending:196kB present:3129332kB managed:2872032kB mlocked:0kB kernel_stack:2304kB pagetables:2404kB bounce:0kB free_pcp:1516kB local_pcp:804kB free_cma:0kB [ 317.219222] lowmem_reserve[]: 0 0 690 690 [ 317.223540] Node 0 Normal free:11680kB min:9464kB low:11828kB high:14192kB active_anon:3988kB inactive_anon:704kB active_file:9388kB inactive_file:4384kB unevictable:0kB writepending:28kB present:786432kB managed:706992kB mlocked:0kB kernel_stack:10688kB pagetables:312kB bounce:0kB free_pcp:2372kB local_pcp:1284kB free_cma:0kB [ 317.252930] lowmem_reserve[]: 0 0 0 0 [ 317.256819] Node 1 Normal free:3093256kB min:42048kB low:52560kB high:63072kB active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3141280kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 317.284696] lowmem_reserve[]: 0 0 0 0 [ 317.288577] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 317.302125] Node 0 DMA32: 2*4kB (E) 3*8kB (ME) 4*16kB (ME) 5*32kB (E) 10*64kB (UME) 2*128kB (ME) 1*256kB (M) 3*512kB (UME) 3*1024kB (UME) 5*2048kB (UM) 223*4096kB (M) = 929664kB 10:32:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 317.318459] Node 0 Normal: 2*4kB (UM) 11*8kB (ME) 22*16kB (UE) 15*32kB (E) 44*64kB (UME) 38*128kB (UME) 8*256kB (UM) 2*512kB (M) 0*1024kB 0*2048kB 0*4096kB = 11680kB [ 317.333806] Node 1 Normal: 4*4kB (UME) 3*8kB (UME) 6*16kB (UE) 6*32kB (UME) 7*64kB (UME) 8*128kB (UME) 2*256kB (UM) 5*512kB (ME) 6*1024kB (M) 5*2048kB (ME) 750*4096kB (M) = 3093256kB [ 317.350595] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 317.359646] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 317.368369] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 317.377399] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 317.386106] 34691 total pagecache pages [ 317.390114] 0 pages in swap cache [ 317.393786] Swap cache stats: add 0, delete 0, find 0/0 [ 317.399192] Free swap = 0kB [ 317.402350] Total swap = 0kB [ 317.405396] 1965979 pages RAM [ 317.408539] 0 pages HighMem/MovableOnly [ 317.412690] 281927 pages reserved [ 317.416172] 0 pages cma reserved 10:32:24 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff00008000000000000000000000", 0x2d}], 0x1}, 0x0) 10:32:24 executing program 3 (fault-call:2 fault-nth:0): r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000080000009500000000000200"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r0 = getpgrp(0xffffffffffffffff) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x3cc877034dcaa9ac, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x9, 0xcee70000000000, 0x6, 0x5, 0x0, 0x40, 0x8, 0x2, 0xffffffffffffffbd, 0x396, 0x3ff, 0x8, 0x7, 0x2, 0x10001, 0x4, 0x800, 0x7, 0x6, 0x0, 0x8, 0x48, 0x63, 0x8000, 0x1ff, 0x3ff, 0x6, 0x9, 0x0, 0x8, 0x3ff, 0x5, 0xf8, 0x7, 0x1ff, 0x2, 0x0, 0x45, 0x3, @perf_config_ext={0x8cd1, 0x2000000000000000}, 0x208, 0x1f, 0x3, 0x0, 0x0, 0x5, 0x1}, r0, 0x6, r1, 0x2) 10:32:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp6\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, [@ldst={0x3, 0x3, 0x1, 0xf, 0xe, 0x18, 0x11}, @generic={0x400, 0x3ff, 0x612, 0x8, 0x4}, @map={0x18, 0x8, 0x1, 0x0, r0}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:24 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff00008000000000000000000000", 0x2d}], 0x1}, 0x0) 10:32:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:25 executing program 2: r0 = request_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000140)='\x9bselinuxkeyring#md5sumcgroup-vboxnet0+ppp0{vboxnet1\x00', 0xffffffffffffffff) r1 = add_key(&(0x7f00000001c0)='.request_key_auth\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="b0faee94035d1255de787d7d7e3a7fe2cec51ae1db0022d79a3d0ab008017ff959a4daad78732d8d038f21705e9818395a8125689815d0356db0c368196d7206d68822239efad92152ec5feca09b3e3dddb21cb2c1c50b13f9a63c2c8d234fc2de107ee1", 0x64, 0xffffffffffffffff) keyctl$link(0x8, r0, r1) r2 = getgid() r3 = getegid() fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000400)=[0xee00]) r7 = getgid() getgroups(0x8, &(0x7f0000000440)=[0xee01, 0xee01, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xee01, 0xee00]) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getegid() getgroups(0x9, &(0x7f0000000540)=[r2, r3, r4, r5, r6, r7, r8, r9, r10]) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:25 executing program 0 (fault-call:3 fault-nth:0): r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0x2, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0xbf8f, 0xc3, &(0x7f00000001c0)=""/195, 0x0, 0x2}, 0xfffffffffffffff8) [ 318.408507] FAULT_INJECTION: forcing a failure. [ 318.408507] name failslab, interval 1, probability 0, space 0, times 0 [ 318.420096] CPU: 1 PID: 12630 Comm: syz-executor.0 Not tainted 5.0.0+ #11 [ 318.427075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.436497] Call Trace: [ 318.439183] dump_stack+0x173/0x1d0 [ 318.442883] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 318.448148] should_fail+0xa19/0xb20 [ 318.451943] __should_failslab+0x278/0x2a0 [ 318.456247] should_failslab+0x29/0x70 [ 318.460202] kmem_cache_alloc_node+0x123/0xc20 [ 318.464850] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 318.470276] ? __alloc_skb+0x218/0xa20 [ 318.474240] __alloc_skb+0x218/0xa20 [ 318.478027] netlink_sendmsg+0xb82/0x1300 [ 318.482267] ___sys_sendmsg+0xdb9/0x11b0 [ 318.486387] ? netlink_getsockopt+0x1460/0x1460 [ 318.491125] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 318.496371] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 318.501790] ? __fget_light+0x6e1/0x750 [ 318.505837] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 318.511107] __se_sys_sendmsg+0x305/0x460 [ 318.515340] __x64_sys_sendmsg+0x4a/0x70 [ 318.519473] do_syscall_64+0xbc/0xf0 [ 318.523271] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 318.528510] RIP: 0033:0x457f29 [ 318.531768] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 318.550736] RSP: 002b:00007ff8d1a47c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 10:32:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 318.558515] RAX: ffffffffffffffda RBX: 00007ff8d1a47c90 RCX: 0000000000457f29 [ 318.565839] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 318.573149] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 318.580459] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff8d1a486d4 [ 318.587772] R13: 00000000004c5561 R14: 00000000004d9408 R15: 0000000000000005 [ 318.829332] IPVS: ftp: loaded support on port[0] = 21 [ 319.087045] chnl_net:caif_netlink_parms(): no params data found [ 319.164616] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.171168] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.179753] device bridge_slave_0 entered promiscuous mode [ 319.190172] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.196762] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.205958] device bridge_slave_1 entered promiscuous mode [ 319.241843] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 319.253632] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 319.289098] team0: Port device team_slave_0 added [ 319.299317] team0: Port device team_slave_1 added [ 319.377284] device hsr_slave_0 entered promiscuous mode [ 319.424171] device hsr_slave_1 entered promiscuous mode [ 319.500232] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.506844] bridge0: port 2(bridge_slave_1) entered forwarding state [ 319.514101] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.520653] bridge0: port 1(bridge_slave_0) entered forwarding state [ 319.611152] 8021q: adding VLAN 0 to HW filter on device bond0 [ 319.634775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 319.645621] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.656400] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.668807] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 319.691392] 8021q: adding VLAN 0 to HW filter on device team0 [ 319.713327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 319.721871] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.728375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 319.778978] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 319.787418] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.793998] bridge0: port 2(bridge_slave_1) entered forwarding state [ 319.803885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 319.815456] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 319.833905] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 319.864623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 319.887882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 319.901017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 319.952887] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 320.087958] FAULT_INJECTION: forcing a failure. [ 320.087958] name failslab, interval 1, probability 0, space 0, times 0 [ 320.099402] CPU: 0 PID: 12645 Comm: syz-executor.3 Not tainted 5.0.0+ #11 [ 320.106382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.115769] Call Trace: [ 320.118438] dump_stack+0x173/0x1d0 [ 320.122135] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 320.127387] should_fail+0xa19/0xb20 [ 320.131178] __should_failslab+0x278/0x2a0 [ 320.135485] should_failslab+0x29/0x70 [ 320.139464] kmem_cache_alloc_trace+0x125/0xb40 [ 320.144194] ? __sk_attach_prog+0x95/0x5a0 [ 320.148485] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 320.153761] __sk_attach_prog+0x95/0x5a0 [ 320.157888] sk_attach_bpf+0x17e/0x200 [ 320.161852] sock_setsockopt+0x389a/0x4bb0 [ 320.166174] __sys_setsockopt+0x336/0x540 [ 320.170395] __se_sys_setsockopt+0xdd/0x100 [ 320.174790] __x64_sys_setsockopt+0x62/0x80 [ 320.179171] do_syscall_64+0xbc/0xf0 [ 320.182961] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 320.188196] RIP: 0033:0x457f29 [ 320.191442] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.210415] RSP: 002b:00007fc9335fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 320.218187] RAX: ffffffffffffffda RBX: 00007fc9335fac90 RCX: 0000000000457f29 [ 320.225504] RDX: 0000000000000032 RSI: 0000000000000001 RDI: 0000000000000003 [ 320.232841] RBP: 000000000073bf00 R08: 0000000000000004 R09: 0000000000000000 [ 320.240165] R10: 0000000020000040 R11: 0000000000000246 R12: 00007fc9335fb6d4 [ 320.247486] R13: 00000000004c60d8 R14: 00000000004db100 R15: 0000000000000005 10:32:27 executing program 3 (fault-call:2 fault-nth:1): r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="070000000800000295000000bf000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:27 executing program 0 (fault-call:3 fault-nth:1): r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 320.445935] FAULT_INJECTION: forcing a failure. [ 320.445935] name failslab, interval 1, probability 0, space 0, times 0 [ 320.457356] CPU: 1 PID: 12652 Comm: syz-executor.0 Not tainted 5.0.0+ #11 [ 320.464495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.473888] Call Trace: [ 320.476556] dump_stack+0x173/0x1d0 [ 320.480240] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 320.485493] should_fail+0xa19/0xb20 [ 320.489288] __should_failslab+0x278/0x2a0 [ 320.493591] should_failslab+0x29/0x70 [ 320.497548] __kmalloc_node_track_caller+0x202/0xff0 [ 320.502706] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 320.508122] ? kmem_cache_alloc_node+0x1d2/0xc20 [ 320.512925] ? netlink_sendmsg+0xb82/0x1300 [ 320.517300] ? netlink_sendmsg+0xb82/0x1300 [ 320.521672] __alloc_skb+0x309/0xa20 [ 320.525427] ? netlink_sendmsg+0xb82/0x1300 [ 320.529801] netlink_sendmsg+0xb82/0x1300 [ 320.534024] ___sys_sendmsg+0xdb9/0x11b0 [ 320.538159] ? netlink_getsockopt+0x1460/0x1460 [ 320.542893] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 320.548137] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 320.553564] ? __fget_light+0x6e1/0x750 [ 320.557601] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 320.562851] __se_sys_sendmsg+0x305/0x460 [ 320.567084] __x64_sys_sendmsg+0x4a/0x70 [ 320.571211] do_syscall_64+0xbc/0xf0 [ 320.574989] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 320.580220] RIP: 0033:0x457f29 [ 320.583557] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.602501] RSP: 002b:00007ff8d1a68c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 320.610266] RAX: ffffffffffffffda RBX: 00007ff8d1a68c90 RCX: 0000000000457f29 [ 320.617570] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 320.624871] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 320.632173] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff8d1a696d4 [ 320.639472] R13: 00000000004c5561 R14: 00000000004d9408 R15: 0000000000000005 10:32:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:27 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x400, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}}, 0x4000) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000340)={'bond_slave_1\x00', 0x200}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:27 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) prctl$PR_GET_DUMPABLE(0x3) 10:32:27 executing program 0 (fault-call:3 fault-nth:2): r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) 10:32:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="8500009c7ccfa7390000000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) 10:32:28 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000140)={0x8, &(0x7f0000000080)="0bb185c0e165008d31bebaa36008549b264f028a27f3ee5aaa7618dbca9f7b79b9b36b6e45a3f208c93d4a32178680b3ec4f1f06fbbe"}) r1 = socket$kcm(0x10, 0x800000000002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) 10:32:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="d5da"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:28 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x41f00}, 0x48) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000240)={0x0, 0x80000, 0xffffffffffffff9c}) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f00000002c0)={r3, 0x80000, r4}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000001c0), 0x4) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) 10:32:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000008000000950000b30000ff00"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:28 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x4500, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x7f, 0x3f, 0x207, 0x6, 0x2, 0x101, 0x1f, 0x1, 0x0}, &(0x7f00000001c0)=0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r2, 0x80000000}, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r3, 0x4) [ 321.676551] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. [ 321.793979] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:28 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) accept4$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000280)=0x14, 0x80000) mknod(&(0x7f0000000080)='./file0\x00', 0x8810, 0x7) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000002280)=ANY=[@ANYBLOB="85000000080000009500deffffff40fa"], &(0x7f00000001c0)='syzkal\x02\x88\xdb\x9a\xcf/\x8e\xa8\xda%\xbeL\xbaU{\xcbq\xdb\a\xb1\xdf2<\xc0(N^_\xf0z\xa43+\x06l\x82\xf5wzx\xe8\xf95\x10\x9d\x12\x04%\xdf\x01\x1b5\xb1I\x9aQl\x16\xff\x81$\f)\t\x18\xf76_\xa4\x02e\xa2\x9av\x19\x87\x00\xba\xcaf\x1bV\xacrgM\xab\xf5\xa4\x97\xccR\x01J\xca\xf7I\xd5\xf4s\x81\xfb2*-kNx\x99\r(\xa0\xecu\xa8y\xf2]\x01i\xe9\b_7\x9cq\x8c\x11\xa7\xb4\x8d,\xa4\xa4H\xb8\xdf`?O\xf4;\xc4zd\x9c\xf4g$\xd9\"\x18\xcab\xe5d\xd6\x18\xd6Y\x90)\xd7\x98$-\x19\xd2\xcf\xc9\n\xca', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r1, 0x1000000000000}, 0x48) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xb0, r2, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x199d019e}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip_vti0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x10}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x4}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x75}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffffff9}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x8}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4010}, 0x4) bind$vsock_dgram(r0, &(0x7f0000000180)={0x28, 0x0, 0x2711, @host}, 0x10) 10:32:28 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000080)=ANY=[@ANYBLOB="85000000082020950000b78e1e0000150000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x10d) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) 10:32:29 executing program 0: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x2) r1 = socket$kcm(0x10, 0x800000000002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) 10:32:29 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="85000000080000009500000000000000bbc86d7e3c2c9d5388f122f87ab715fdaf443908f2a1f020f7e63381056367780b84f06a73be64fd18f4652599b06b0c138da65eac49440527722fed92911fb4d647f8f125edeeb60cd14c4ae103c56761ab12df6067bc4f6cfd1e00006cdb40e79ea2e9cb4c3447082f8edd2485516a764b98cbd3808c5841b65a18"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x2}, 0x48) [ 322.213386] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:29 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U-', 0xffffffff}, 0x28, 0x1) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) r1 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x0, 0x42000) r2 = getegid() ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000280)={0x5, 0xa1e}) getgroups(0x7, &(0x7f00000003c0)=[r2, r2, r2, r2, r2, r2, r2]) ioctl$TUNSETGROUP(r1, 0x400454ce, r3) ioctl$sock_ifreq(r1, 0x897f, &(0x7f00000002c0)={'hsr0\x00', @ifru_addrs=@vsock={0x28, 0x0, 0x2711}}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(salsa20-generic,sha512-avx)\x00'}, 0x58) ioctl$CAPI_INSTALLED(r1, 0x80024322) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, r1, 0x0, 0x1, &(0x7f0000000300)='\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r4, 0x4) 10:32:29 executing program 3: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xa2000000000000}, 0x8) close(r0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x540, 0x0) r2 = accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @broadcast}, &(0x7f00000001c0)=0x10, 0x80000) futex(&(0x7f0000000100)=0x2, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000080), 0x84fffffc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000240)={'ip6gre0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}}) r3 = socket$kcm(0x10, 0x5, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r4, 0x4) 10:32:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) 10:32:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000004080000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 322.560552] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. [ 322.605536] futex_wake_op: syz-executor.3 tries to shift op by -1; fix this program [ 322.654740] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. [ 322.660111] futex_wake_op: syz-executor.3 tries to shift op by -1; fix this program 10:32:29 executing program 2: r0 = socket(0x9, 0x4, 0x4) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x0, 0x9, 0x633, 0xffffffff, 0x1000}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000002c0)={r1, 0xfae0}, &(0x7f0000000300)=0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f00000001c0)={r3, @in={{0x2, 0x4e22, @empty}}}, 0x84) 10:32:29 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:29 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000080000009500000000080000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) setsockopt(r0, 0x81, 0x7a75, &(0x7f00000001c0)="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", 0x1000) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:29 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 10:32:30 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 322.997985] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. [ 323.031978] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:30 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x80, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000200)=""/227) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000140)=0xb51e) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) accept$alg(r1, 0x0, 0x0) 10:32:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x240000, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000080)={0x2, 0x2, 0xb12}) 10:32:30 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzka\xdd\xfd\x01\xf62', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:30 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 10:32:30 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f00000001c0)={0x0, 0x0, 0x2080}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) [ 323.387133] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) 10:32:30 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) getresuid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000280)) r3 = getegid() lchown(&(0x7f00000001c0)='./file0\x00', r2, r3) [ 323.600874] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:30 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f00000003c0)="a6e2badc8952ebde72ec60087c0bdb17d34f34c78202d1ec5839e096a4f43334e7972b0090a066170ff5ddc3edf032b8b4b6ca7acda91a9425de02806fa291cbeeadd4903f2f6b") getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x24) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="850000000000deff950000000000000018ec6ec54fda2f98bdfc33bfdfd0fc618d464d6c391b7e63c29c846545f321a3e8ef9469d31f9caf561a0941758e8d95b92c4f4911bb2d367ebd6ce89fa8dd12a648b03d77358612f3a924f11c6f11b65aa6bb10fbfd4003f6921c4fe33f8353d54e3f31fdbd8fd7f5326fb41533786d61ecac3718af38feda5ea0fc2e5571adbab8606f0c7ee57c3b1b78b2553f6d707c0a18fb26c287191051364d694583b6477ba98d55f4e333d4510cfd789d44b0"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) [ 323.641926] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) [ 323.702284] QAT: Invalid ioctl 10:32:30 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="850000f4e30000000000000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r2 = socket$rds(0x15, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) epoll_create(0x9) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x4e24, @remote}}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000240)) [ 323.753081] QAT: Invalid ioctl 10:32:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) 10:32:31 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000080)=ANY=[@ANYBLOB="85006e8924acc327c50000000000bdc977d6344998c85556e8af4b0000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:31 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x40, 0x80) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x0, 0x7, 0x3e, &(0x7f0000000080)="0b358713b32b81d21ef97bc58a421d639b15d0cf6bbf20de5b4f5e1c32f0eba59e1cca3ed2b9bc2229326c446dd7a21f13ffccd53387ac61084f4a5f48f7"}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1, 0x2000000000000029, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) 10:32:31 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) r2 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x80008, 0x8000) getgroups(0x9, &(0x7f0000000200)=[0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xee00]) ioctl$TUNSETGROUP(r2, 0x400454ce, r3) 10:32:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) 10:32:31 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) 10:32:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000008010000009500000000ddff00"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f00000001c0)="d565f12dbe117b91d5d96ac7d9cb41ca16893209f4aca891018331dcc594c1f28f5a314cb8fd9bfbc4c97c6620b66dccffbd0d057d723777e2e05b981c66ac1c07f4315bd35c8675e100b52fb161a065a478f94095fe5cbf062ff1c8ff404fb02998df76d6cdcd4c17f7afc382aae14a") 10:32:31 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x6080, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000200)=""/49) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) 10:32:31 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000000000000fcffffffffffffff"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x9, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000140)=0x7f, 0x8) 10:32:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) 10:32:31 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x101002, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000140)=0xc) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)=0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="85000000080000009500000000939deb70677b7032e0000000e16084d828dc69752b0be554e6c48be9b294c6c81e6ce1f953d3be42d1e1cb69ff24d4ee6badff72733f"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:31 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000009500000000000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 324.910446] QAT: Invalid ioctl 10:32:32 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000080)=ANY=[@ANYBLOB="850000000800000095000000800000005bd8f2305594a4d47f6ae9e68fbf51494857f1202bc7e0aa9e"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) [ 324.956162] QAT: Invalid ioctl 10:32:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}], &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) 10:32:32 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000100)=0x6) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) ptrace$getenv(0x4201, r2, 0x1, &(0x7f0000000000)) connect$pptp(r1, &(0x7f0000000080)={0x18, 0x2, {0x0, @multicast1}}, 0x1e) 10:32:32 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:32 executing program 3: r0 = socket$kcm(0x10, 0x7fffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) fcntl$setpipe(r0, 0x407, 0x3) shmget(0x1, 0x1000, 0x20, &(0x7f0000ffc000/0x1000)=nil) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r1, 0xfffffecd) 10:32:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, &(0x7f0000000000), &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) 10:32:32 executing program 0: syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0xe38, 0x16600) r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000001c0)) 10:32:32 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8, 0x0) bind$isdn(r0, &(0x7f0000000080)={0x22, 0x7, 0x4, 0xffff, 0x9}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000080000009500000000000000e6b22a2505af"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, &(0x7f0000000000), &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) 10:32:32 executing program 3: r0 = socket$inet(0x2, 0x4, 0x8) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)=0x7f, 0x4) r1 = socket$kcm(0x10, 0x800000000002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) 10:32:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, &(0x7f0000000000), &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) 10:32:32 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="850000000800000095a9c3022501000000000000838604c541ba8f401eecdd0a2ba2a7130000000000000000"], &(0x7f00000001c0)='s_\x17\x89\x82\xd0\xb8\x19\xeer\xde\x9e\x02\x11\x13\xbaler\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x2000000000}, 0x48) bind(r0, &(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x0, 0x1, 0x2, 0x3}}, 0x80) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000200)={@broadcast, @remote, 0x0}, &(0x7f0000000240)=0xc) connect(r0, &(0x7f0000000280)=@xdp={0x2c, 0x7, r1, 0x14}, 0x80) 10:32:33 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x4240, 0x0) connect$l2tp(r0, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e23, @loopback}, 0x3, 0x1, 0x0, 0x3}}, 0x26) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x101fffffffc}, 0x48) 10:32:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@call], &(0x7f0000000180)='syzkaller\x00', 0x5}, 0x48) 10:32:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000008000485bfe2009500000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000300)=0x30) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x200) sendmsg$tipc(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000001c0)="6637e7cd2da3c91bbea23ba5b6284d4cc08667837dbd80cee6ce9d3f698ac18b9bb6d69eaaacd2cf456441c0bc89e09704a574f10615da6210edc16fdd0a8e268b8f434f41d5d916cc5f4f42711b338282d511fea652987faf35c25ddabaff5e784769da94c8c932f95c7a820a29b5c8ec4e9d85218a56c735f6becbd3a6d1e536becbb7470dce9f198443a92013405da351580218dcafbad84b16a58874a99aa80dfeae502799110ae81123ac23f51fa5dcbd207ffc2648bd022bc6f855ff738213b03c6fbb92f77bfb653b89fe108013b131f5ef7d529ac7bec763d2fb24b857da70018b95", 0xe6}, {&(0x7f00000007c0)="023a7a93cf8b83a348a32215e5ac352175db1c3357925010bf41e716e1f1eb23ae6eff9e422750f95cb6e328dc882b40f474a97faf650b0a8afd3eb8c65548243db64d8ab2d2fb2652e1b9a0e31d94efad31bd39932e13ad90684717841be05be2b3c46466463838736078d82299f2ecc7ab", 0x72}, {&(0x7f0000000700)="63ad8b1ca1018aa06fd8af59b01e36cdea54f31d1ce9457eaf58f14aa6c3d9fc49e090ccf83b77f015e57f6662134ab566ad180b4251803a9cfc653d1ed140168f45c105c2615614a4a0f7dfc276a324ab4396b712f863cfc10e70f12ebe774cbea9863b700b54b9dd3d166a88e35d6ae4a36821fee14f788c4390398d6ccbc28671300ddff5", 0x86}, {&(0x7f0000000140)="5b453ba6615eef746fc07f7094d63bd52ae4ae59cb1af9d227b743710b", 0x1d}, {&(0x7f0000000400)="14988651c896fb38f806c8d2983dfa9580589e24dae9aeaf88cdf7c66db7f341349e0365a2dbd20da8938f49e0488c92cf93302ba9c44d379987518893f74ce0dd04e644443545f729e08b6deb572bef4f8133bb952b7f4cac6f20408e1ca23d5795276c624142d32333f3a01fbe0b6f56a64c991aa9f759860bc9bcbd330b624db9944d8504beff50525226d241d63f1ed9dbf23c5b5a84265a50685cb58090ec7499111bd20469b4ef9453d5ba3d9d30a383248a0092a7c12d01bb6beb7339e72c14abf723c09295aa811334d5365c892f4f1b6133d845ee1e17a5c8d4e2", 0xdf}, {&(0x7f0000000500)="1f2ac2880ff8d27a80f6a75b", 0xc}, {&(0x7f0000000540)="088a1d7dbe2ec1bb6f4ce013f6d205ef101878047463f0073c6ea116c34d491d956eba0cb6054154cff2107cbedaaed9f92ec33affecb5eb098e08f26667389eff8a65820491d5757fef04d2cdabbf794fd0dae12a749d79a4820153df02789cc89507e9227384cd491613feef3359d753cf46092603696ba4ce7e4c09d1ec11a74eddae313158e5145393935d9a24cd7cf27fd8ec825ca9b3ac3ca1eef044f57bcd41ddee4bd5846c32ae0986063ba5641114659dd433a6bf4c3d3008ce75174f22242ebdd38f0a23c743ad86d8736b1bf77641a6e9", 0xd6}], 0x7}, 0x84) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$netlink(r2, &(0x7f00000008c0)={&(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000003c0)=[{&(0x7f0000000840)={0x5c, 0x36, 0x20, 0x70bd28, 0x25dfdbfd, "", [@generic="77881e523589c35db81a88a4a89873d4c19bcfbbbab17f62ca6fb122ca1c0887dc9d3dd094bb5dacd96c81b2abadbe1f4fe26df71279e478e3e6c4bf075f71041579d1617f7aa88991b022e6"]}, 0x5c}], 0x1, 0x0, 0x0, 0x800}, 0x4040000) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000340)={0x5, 0x0, 0xfffffffffffffffa, 0x5}, 0x8) 10:32:33 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000300)=ANY=[@ANYBLOB="85000000080000009500000000000000da8891b109e99656caa32f7021bf9f59f7e7799b974dca948b47726e07ac3beee20d9f72fbaea0c3cc9cfb432b7043b461483d08a664613f57f985e4f19e08176d6e9dd22ef4e9f42b2b751795192cb795e08d728d4912c6bfba01d4beb7ab812ab83864a2c0d141b5325948a607396cf36da3130f2fe7778587b92df26cae6b0a02f5e7451cb74ccca990535d446a82e3163cb25dd3a07d14d92d9cdad58c144e552d28a8703c01471350fa5a7729cd088e638371a30eb1a4061cfbecc0a31e172336c3a86f"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x501000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r2, 0x110, 0x3) setsockopt$packet_buf(r1, 0x107, 0x17, &(0x7f0000000200)="364d30db504eaa41cc6b8ff49b239cbc8579418f943e18bca909bff80f031738fadba9c63d4b3df098c9ed68896ac975fc59a6ce755736679a8c0845fff1fd787723b0952027c1ddcb5c0fbdc3ed46b204e9d2b144cc30d50abedd7534dc5569ac6a2683264084f92a7d664fdec83e470d763c7aa63cfe8d62a3bda07e517c44ad339aa43f836ef418cd646f8327a8a6ac097bc66d5f4d74587e07abdc5eba450ec901006fd7e305d9b55a5215b497a808223d5a126a727d9337d93bc92991b9009b37be829c7f", 0xc7) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="850000e307000078748a3c00100000008463658477f23af7d152b445987f614e97b13e83592b2fac2beac9b3108f9efe5a36b4bf3702d3690465f11500e9c06a6fb34203980e77a2cb8ce808bbf4f0d77e8684ec6cd5b0712cd5df1a997c7246fbe0d2467d3bb01760e2dd69e306ea9a71410f5643a361de15a11f5932d889dc621318b667d38e8942b0211db5726591f0856176cc3696b57ca1de7d4064e36355bc3e60d9ac5032a0c18d28"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@call], 0x0, 0x5}, 0x48) 10:32:33 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="850000001b5433000000950000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x200000, 0x0) r3 = shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ffc000/0x2000)=nil) shmctl$IPC_STAT(r3, 0x2, &(0x7f00000001c0)=""/176) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000140)={0x119, 0x40, 0x0, 0x4, 0x19, 0x6, 0x3, 0x80, 0x0, 0x10000, 0x8ba, 0x728}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x2c, "bdca853188d5d0c47bfc82423dc531ffcfded5eec52ee18fcd51d4fd0e817172462d8cd1a316364a169d2a86"}, &(0x7f0000000340)=0x34) 10:32:33 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = semget$private(0x0, 0x1, 0x50) r3 = syz_open_dev$usbmon(&(0x7f00000007c0)='/dev/usbmon#\x00', 0x80000000, 0x1c0) setsockopt$packet_fanout_data(r3, 0x107, 0x16, &(0x7f0000000840)={0x3, &(0x7f0000000800)=[{0x200, 0x8, 0xffff0000, 0x40}, {0x400, 0x80000000, 0x0, 0xfb}, {0x666573e8, 0x3, 0xeaa5, 0x9}]}, 0x10) semtimedop(r2, &(0x7f00000001c0)=[{0x5, 0x0, 0x1000}, {0x2, 0x3, 0x1800}, {0x0, 0x6020, 0x1000}, {0x3, 0x20, 0x1800}, {0x4, 0x7}, {0x3, 0x80000001, 0x1000}], 0x6, &(0x7f0000000200)={0x0, 0x1c9c380}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x4, 0x1) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) 10:32:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@call], 0x0, 0x5}, 0x48) 10:32:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@call], 0x0, 0x5}, 0x48) [ 326.808215] __nla_parse: 12 callbacks suppressed [ 326.808259] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:33 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000800084000ffffffff27ff350000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:34 executing program 2: r0 = accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000600)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x400001, 0x2b, &(0x7f0000000640)=ANY=[@ANYBLOB="85000000080000009500000000000000fd1497bfc539b01f0a9036fba918fbc13eb0a2e226d00292ae1a1f972c308e8c23dbb732a0deb555c4aec7e289a44ae47f581eb098786eb28f93ad9f4147ea937d02b5045e6916fb1e2ac6dec65822a75558bea3f6f527a3b1467ed3c2d62c2adf5567c0f5bf02255630e93e4e6ab7b46b3af0b628af286971c92e859d6969586b1a62f5b6d1ce0764eb5bf0a1ec2da7bba38524ca23104248f7277fe66170bfa370ab77b7e086289b0abe023b31ac3cf624fc65c7dc57aad0a69bfebc536a412172a3f24d16fd3627d3d47c407600096770c7c4ce15346c77a1d116502e2002a5edeb83620a8f2fb6201e8a98e1f52b351a98b0cdff62e2738740559d37b6e6c57cd03e1e57520afebb3bf209a00315dfac9be06a8adbffa68287c73745e9d18bec4a5edf540771a49af59a57777e68a9c1a946bf3025e4c9ebd31dd661819497b739091838f0f0e43ec98e"], &(0x7f0000000080)='syzkaller\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r1, 0xf}, 0x33) ioctl$sock_ifreq(r0, 0x8993, 0xffffffffffffffff) socket$bt_rfcomm(0x1f, 0x3, 0x3) 10:32:34 executing program 0: r0 = socket$kcm(0x10, 0x7, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x22d5029967388cc6, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000280)={0x84b6, 0x8, 0x7ff, 0x8, 0xf, 0x1, 0x30000000000000, 0x80000000, 0xfff, 0x0, 0xfffffffffffffff7, 0x200}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) rt_sigaction(0x20000000001c, &(0x7f0000001140)={0x0, {}, 0x0, 0x0}, &(0x7f0000000100)={0x0, {}, 0x0, 0x0}, 0x8, &(0x7f0000001180)) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x80900, 0x0) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f0000000200)=r1) timer_create(0x7, &(0x7f0000000380)={0x0, 0x36, 0x4, @thr={&(0x7f00000002c0)="47c8a76a36d222e7981cbad264fd56dae2051adc4e", &(0x7f0000000300)="d8cf98102e1cebfbafabfa0613ad24d25533b088af2d733346a3b196d08998331b033c4f0489a88ff44b74373e285cbd2c45271707247d23e09d91e094cbc16d07c21f9030f7d93e889b56431c"}}, &(0x7f00000003c0)=0x0) timer_gettime(r5, &(0x7f0000000400)) 10:32:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@call], 0x0}, 0x48) 10:32:34 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="850000000800000094fffff600000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x671020000, 0x800) recvmsg$kcm(r2, &(0x7f0000000900)={&(0x7f0000000380)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000400)=""/110, 0x6e}, {&(0x7f0000000480)=""/162, 0xa2}, {&(0x7f0000000540)=""/184, 0xb8}, {&(0x7f0000000600)=""/234, 0xea}, {&(0x7f0000000700)=""/238, 0xee}], 0x5, &(0x7f0000000880)=""/80, 0x50}, 0x2000) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x1, 0x6, 0xfffffffffffffffa, 0x200, 0x0, 0x5, 0x8, 0x1}}) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000140)=0xffffffffffffff9c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x28, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r3, 0x7, 0x10}, 0xc) openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x90100, 0x0) 10:32:34 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x5, 0x8000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e22, 0x81, @ipv4={[], [], @multicast2}, 0x400}}, 0x10001, 0x20, 0x50, 0x7ff, 0x1}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000140)={r1, 0xff}, &(0x7f0000000280)=0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@call], 0x0}, 0x48) 10:32:34 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) rseq(&(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x8, 0x2, 0x3f}, 0x4}, 0x20, 0x0, 0x0) 10:32:34 executing program 0: r0 = socket$kcm(0x10, 0x0, 0x0) readlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/20, 0x14) r1 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x6, 0x600400) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000600)={'nat\x00', 0x0, 0x4, 0xffffff4f, [], 0x1, &(0x7f00000005c0)=[{}], &(0x7f00000002c0)=""/122}, &(0x7f0000000680)=0x29) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000400)=0x1e, 0x4) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000440)={0xad48d940d91d000f, 0x9, 0xec5e, 0xfffffffffffffffc}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:34 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, r0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8, 0xa0000) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xb, 0x200000000000033d, &(0x7f00000002c0)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x3c}, @alu={0x4, 0x3, 0xe, 0x2, 0xf, 0x30, 0xfffffffffffffffc}], &(0x7f0000000180)='GPL\x00', 0xd7c8, 0xc3, &(0x7f00000001c0)=""/195, 0x0, 0x1, [], 0x0, 0xfffffffffffffffe}, 0x48) 10:32:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=@raw=[@call], 0x0}, 0x48) 10:32:34 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) 10:32:34 executing program 0: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)=0x0) r3 = accept4$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x1c, 0x80800) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r3, 0x6, 0x15, &(0x7f0000000340)=0x7fff, 0x4) getpgrp(r2) 10:32:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xc193, 0x420000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f00000001c0)="c3800a8207c5eedc743df39e0b326dcceb1a3bccead3ec8d83660a4f45e92e3f399d1a98fa1f87431a9d32c1f2089cd29bf73e429695581dce1e60e7df550ec88817ee4eb245819b84efcf6216b3a2847282172cb8cb30698dba7b2bb603983047f2", &(0x7f0000000080)=""/34}, 0x18) [ 327.960789] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:35 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = semget$private(0x0, 0x1, 0x50) r3 = syz_open_dev$usbmon(&(0x7f00000007c0)='/dev/usbmon#\x00', 0x80000000, 0x1c0) setsockopt$packet_fanout_data(r3, 0x107, 0x16, &(0x7f0000000840)={0x3, &(0x7f0000000800)=[{0x200, 0x8, 0xffff0000, 0x40}, {0x400, 0x80000000, 0x0, 0xfb}, {0x666573e8, 0x3, 0xeaa5, 0x9}]}, 0x10) semtimedop(r2, &(0x7f00000001c0)=[{0x5, 0x0, 0x1000}, {0x2, 0x3, 0x1800}, {0x0, 0x6020, 0x1000}, {0x3, 0x20, 0x1800}, {0x4, 0x7}, {0x3, 0x80000001, 0x1000}], 0x6, &(0x7f0000000200)={0x0, 0x1c9c380}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:35 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x41, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f0000000140)={0x1, 0x0, {0x5, 0x1ff, 0x9, 0x5}}) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000000000000000000000000f9ff"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) [ 328.068126] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:35 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x41000}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x200000, 0x20) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000140)={0xffffffffffffff32, 0x0, 0x2, 0x800}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f00000001c0)={0xf5c, r1}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) sched_getscheduler(r2) [ 328.215623] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.1'. 10:32:35 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x80, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000200)=""/227) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000140)=0xb51e) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) accept$alg(r1, 0x0, 0x0) [ 328.377355] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:35 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) getsockname(r0, &(0x7f0000000040)=@nl=@unspec, &(0x7f00000001c0)=0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="083fa8e78004d1f4c7f0f36eb3850000000800000073460445eff290ae"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r1, 0x3697776e5b75fb9b) 10:32:35 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) recvmmsg(r0, &(0x7f0000000b00)=[{{&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/195, 0xc3}, {&(0x7f0000000380)=""/100, 0x64}, {&(0x7f0000000400)=""/232, 0xe8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/88, 0x58}, {&(0x7f0000000140)=""/6, 0x6}, {&(0x7f0000000640)=""/33, 0x21}, {&(0x7f0000000680)}], 0x8, &(0x7f0000000740)=""/226, 0xe2}, 0x8}, {{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000840)=""/50, 0x32}], 0x1}, 0x3ff}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000008c0)=""/164, 0xa4}], 0x1}, 0x63e}, {{&(0x7f00000009c0)=@un=@abs, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000a40)=""/55, 0x37}], 0x1, &(0x7f0000000ac0)=""/29, 0x1d}, 0x80}], 0x4, 0x123, &(0x7f0000000c00)={0x0, 0x989680}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000680)='/dev/dlm-monitor\x00', 0xe000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x0, 0x4) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:35 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x9, 0x20c000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f00000001c0)="e047af8c975d2234f06320c30a3c24696d3dc317624a6233cdc6beb5c1c5936fc3d1c66b8dcf5c0e4099b4b6ef654c20b50524edce294eea7fd12db9964b3dfe756cacfa543403b6452188e2fdb39794e906a0306b2c674cef8f6f", &(0x7f0000000240)=""/188}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 328.703614] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:35 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$CAPI_NCCI_OPENCOUNT(r1, 0x80044326, &(0x7f0000000140)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) 10:32:35 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xa2000000000000}, 0x8) close(r0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x540, 0x0) r2 = accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @broadcast}, &(0x7f00000001c0)=0x10, 0x80000) futex(&(0x7f0000000100)=0x2, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000080), 0x84fffffc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000240)={'ip6gre0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}}) r3 = socket$kcm(0x10, 0x5, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r4, 0x4) [ 328.814498] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. [ 328.897297] futex_wake_op: syz-executor.1 tries to shift op by -1; fix this program 10:32:36 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40000, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85040400000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:36 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) socket$inet_dccp(0x2, 0x6, 0x0) 10:32:36 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x40, 0x0) socket$l2tp(0x18, 0x1, 0x1) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:36 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xa2000000000000}, 0x8) close(r0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x540, 0x0) r2 = accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @broadcast}, &(0x7f00000001c0)=0x10, 0x80000) futex(&(0x7f0000000100)=0x2, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000080), 0x84fffffc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000240)={'ip6gre0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}}) r3 = socket$kcm(0x10, 0x5, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r4, 0x4) 10:32:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="9f0e000008c7e24000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 329.254823] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. [ 329.274943] futex_wake_op: syz-executor.1 tries to shift op by -1; fix this program 10:32:36 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0xfffffffffffffffe, 0x80) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x5c, r3, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x41}, 0x81) ioctl$IMGETDEVINFO(r2, 0x80044944, &(0x7f0000000300)={0x2}) 10:32:36 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f00000002c0)='syzkalle\xea#\x81T\xa6[\xdd\xaf(\n/W\xb8x\xd5\x0e\'(=\x0e\x8c\xd2\x00\xff\xec\xc0', 0x5, 0xc3, &(0x7f00000001c0)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0xd6b, 0x20002) write$P9_RLINK(r2, &(0x7f0000000300)={0x7, 0x47, 0x1}, 0x7) 10:32:36 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xa2000000000000}, 0x8) close(r0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x540, 0x0) r2 = accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @broadcast}, &(0x7f00000001c0)=0x10, 0x80000) futex(&(0x7f0000000100)=0x2, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000080), 0x84fffffc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000240)={'ip6gre0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}}) r3 = socket$kcm(0x10, 0x5, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r4, 0x4) 10:32:36 executing program 2: socket$pppoe(0x18, 0x1, 0x0) [ 329.614308] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. [ 329.657686] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. [ 329.682714] futex_wake_op: syz-executor.1 tries to shift op by -1; fix this program 10:32:36 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) 10:32:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-net\x00', 0x2, 0x0) sync_file_range(r0, 0x77, 0x1, 0x2) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0x4, 0x2b3}, {0x0, 0xc3}]}, 0x14, 0x1) r1 = syz_open_dev$amidi(&(0x7f0000000380)='/dev/amidi#\x00', 0x0, 0x40041) ioctl$CAPI_NCCI_GETUNIT(r1, 0x80044327, &(0x7f00000003c0)=0xc8) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000240)={{0xd000, 0x3000, 0xf, 0xfffffffffffffffb, 0x7ff, 0x7, 0x86, 0x2, 0x6, 0x4000000000000000, 0x8, 0x5}, {0x1f000, 0x1f000, 0xf, 0x1, 0x2, 0x200, 0x4, 0x9204, 0xfff, 0xe3, 0x80000001, 0x6}, {0xd000, 0x10000, 0xa, 0xff, 0x1, 0x200, 0xffffffffffffffe1, 0x5, 0x3, 0x0, 0x9, 0x1}, {0x1, 0x4000, 0xd, 0x7, 0x7, 0x7fff, 0x8, 0x9, 0x2, 0x7, 0x100, 0xc6}, {0x3000, 0x10000, 0x4, 0x7f, 0x4, 0x0, 0x800, 0x7, 0x401, 0x7ff, 0xfff, 0x4}, {0x10003, 0x115000, 0xf, 0x5, 0x8586, 0x101, 0x7, 0x2, 0x668000000000, 0x1, 0x1, 0x60}, {0x6000, 0x100000, 0xd, 0x40, 0x0, 0xfff, 0x2, 0x200, 0x9, 0x10001, 0xfffffffffffffffb, 0x80}, {0x1, 0x0, 0xf, 0x401, 0xffffffff, 0xfffffffffffffff9, 0x1, 0xd00, 0x81, 0xa6fd79900000000, 0x100000000, 0x7}, {0x2000, 0x107000}, {0x5000, 0x2}, 0x8, 0x0, 0x3000, 0x0, 0xe, 0x101, 0x110000, [0xf0ae, 0x200, 0x1, 0x8000]}) 10:32:36 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x381000, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000300)={0x100000001, 0xfdb, 0x7, 0x4}) lsetxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x4a, 0x5, 0x8, "715fc608d0689256434c63f2b1f47948", "995bb517c33c6982fcaf21efac2bf3ea5d38d803affb6c8a78ef2717ce25f9bea8f37ff373b30949e5b8b2b3ec304888e1640fd412"}, 0x4a, 0x533fdb07e263588b) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:36 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xa2000000000000}, 0x8) close(r0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x540, 0x0) r2 = accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @broadcast}, &(0x7f00000001c0)=0x10, 0x80000) futex(&(0x7f0000000100)=0x2, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000080), 0x84fffffc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000240)={'ip6gre0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}}) socket$kcm(0x10, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:36 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x40, 0x0) socket$l2tp(0x18, 0x1, 0x1) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 329.996321] futex_wake_op: syz-executor.1 tries to shift op by -1; fix this program 10:32:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x151000, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000080)=0x20000000000000, 0x4) 10:32:37 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xa2000000000000}, 0x8) close(r0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x540, 0x0) r2 = accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @broadcast}, &(0x7f00000001c0)=0x10, 0x80000) futex(&(0x7f0000000100)=0x2, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000080), 0x84fffffc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000240)={'ip6gre0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:37 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="850000000c0000019500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80100, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000200)={0x10000, 0x2, 0x10f000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) [ 330.312755] futex_wake_op: syz-executor.1 tries to shift op by -1; fix this program 10:32:37 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x80000, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000200)={0x401, 0x0, 0x2, 0x4, 0x1b, 0x400, 0x3, 0x2b, 0x40000000000, 0x3}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000240)=ANY=[@ANYBLOB="850006000000ccfb2506a2bc16fa05a289273df9005a13213dce1f4f6b1aa13bd2be6e83bb53fc3f62e21eddf26f44b23baae10883f72af40ed463866877104d83da85625e6c1ddb211a0cf471a186b1b9e1815244cec55bdaafa5a888607b8275bf08e0b30e4c5d918757bd2b3f346d8b361a2a011dd28b7f150d23c5edc2970345ea6c464bcbe99c5700000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$evdev(r0, &(0x7f00000001c0)=[{{0x0, 0x7530}, 0x0, 0x0, 0x9}, {{}, 0x3, 0x3c5d}, {{0x77359400}, 0x0, 0x7, 0xff}], 0x48) 10:32:37 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xa2000000000000}, 0x8) close(r0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x540, 0x0) accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @broadcast}, &(0x7f00000001c0)=0x10, 0x80000) futex(&(0x7f0000000100)=0x2, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000080), 0x84fffffc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:37 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x6bb, 0x10000) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000140)={0x0, 0xe354, 0x1000, 0x9}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000200)={r3, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x21}}}, 0xd11e, 0x9}, &(0x7f00000002c0)=0x90) [ 330.682809] futex_wake_op: syz-executor.1 tries to shift op by -1; fix this program 10:32:37 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000240)="e0b414fcf08dcd5e67ce942027a33f990aa2ad1d2d9fd2d3a16a601efaef77e1d10ccaa7f58c5b91a9b75fd34f8b5d5a5a91054db68e9249f56095048c0f59500d84164bfdc5a614c3daac3b52dde9a858c7950777198263e6f5cc453cd9f5fa36e32f0338cf6f7196fe30b4e105de08c02ecd1a36cd97f4aec25d9e775ae4714c8ac39d147315013beb9eb05e55bab670147236530e160b4c29f4e0cce5061cfb9252e0194c9e2eee31f341e1217e9922d0f8b01bd07420a4ef78ce5a41a9466957331ecac40e1ddafc8a5c046f3c25f2ebe78040f6c4dddff95415ce540a3d4b53685c09b6930c1e337238944fe18b73c3248559a01e4302358f8aae263a6d62c924fcb86c6afaa72ecbd4c8d13b3cb1ff886fc9e18d24a17362f3d6d111a4e2d0d75ec7608e7b42fa8cf515dc2ddffe763f84c10dcfee7ec67034a85c2b3536412bff96afb6b619cba6ae8c6827f77418cf33ba4eadc4fbb0616856beb4ede39fb16998f4a6f7e96e1f681897ca64c6688e4de57bb343987e2a3bbd9504925ee5db2c55c74a2e7b8b262eeafb945fe9abc865583c54dc3447fe22ee891238fa91e4df376e90a0574ef50084e9e29021afea323b2c6edcfd0d815e5c835c50589054b4031810d703c2cd6a3d9ff3e4f14b5fb616f4b81df23d83f2d414bcc000774d45ed5ed2e5f7ebeec5b75506c31ecca6ac2bce126ebc13b1a10439f869ebef4599446281d1524e92201206e466ad9636af32d2976b1879ba4bead5f5012973978bb4b44dd36f6d5cfe4a602f35c4b6f729e2ff6c50257d8749cbfa84c0c00445876e97eef1515eaf857e7a22cfe6ce96a77b70bb8828591291bed88f07ac8814c0c188ac14928fd0890b9558be8f90bcde086ac847624a8d1a5790789b70901083d9410c5dfaf7527ac61aef5e23633292bae811408e118fb33e434ba1e300f7c62bfe5118b7e0825000d8326bff90995cf8b9d17796249331da7ae4197451b22301ab9e04da2ec162643a8c1d7f25ab8b829b0dbe9a606144c522103f6fb5e874292bf6f40890eee2478ecb2cd573aea05304691e0eecccbbabbd72015671adbff9cafd009faf5593c283d31a3ae39f6169b88225c1ca1ded62bb4d4dbee1b5007341f07168a2d6beba26fbe7ed11f4d88278912dcdc4822a53549d7b882d1300e0760b8b8497b51b99ac85f883e4899f288cdbf126e0e85eacb9e884980aca4e13e56b62b7f42dda63f914410734f7dda14eac4e87f582a65a1d393b8e66ef843e97e60a42ee40a3f685707611af15d291a9308b236b2bfad7f25025a04e63c842719e2a0c34c01b1c653ac0b9b333b114d8c34cc81849d80fb4c5150ab0f931509fb1bbe6b58dacc9a4deab81029e989eb5ee368305697ef768ccea025b510052ccc98949c08f4b3f5982faeb371a41b07d082a3b06b3dd6c59c7c5beb952e50fe4a4c16c03ed51a58d4d94b140a3e9ec67a7fa0d210eb1171fd42bab8e98a3797a9085e88f355b8c55a03f981d97cbf52c5ee2afec94aad377e7fb5f3a56e136545d8918bb8939805a18bc482fda3fcff2e5c89e3638ba55911671e7c97ecd01a95e2e40b901fa649020961bcfb9fd21aa5183db713f18b059fb3eb49fc0ab91ef211cbbe3f4cd068a52fdf18690d283abe70b87c9380b9d7a45317b57378369809a81e9d3f0aa75fac136f337f5de39fdfac7831ec67ef4ab6de749ce73f439c1ed55dc98a1546e677354a6c78f019c19e7130573cfe43c42404f3c928678daab12e82dd5802f99e7c7ef4e35ee0ce8640c589ad974cd8e8bfb66fbe2fe463f0196bf0abe57b3b59ec5c65558154b9ee15c3be60035c7cb89a6c2e66463a5948a6b8128cf8372eca33c5450561a1a3e86382ae64ad3fa7d9d950ff48191c1f7ec2067739dcedb399ea4bc6e0ddbaae6a0736c76e57734f7f25b6e2df6eed309ccf38577f4c9fb3d29ac5055862ae88683cf20f85da663b5b1dede77d0d02d3f111cb925b130fa3fab40e84fa8774224231ceee03e0e4722a405db2b058771488f366ca23de4d1b72373c91605f65f104571c162d1319d645d7f5a40be8608c4a45fb2bbb1f82a7809ed741c40ab1443e60f744b5f3efb72a7a302bb964ccd98822329014616c66aadb952fe516418220a36365359d05721e90d683db1fe307e878e188c5af59033c94bb4192e93121f024e5ed7539666687ab4cf774e8a66ea4f9c42f173adfe6baa3528c584fd025a82c0ee87914e7bdbb98e3fafa2576ce6070f82ea75951353009881470fc2423fff165c6d267b3b3500636376c0f2eb8f8a61e07063361cc244860daed1dfda3ab0c700a686a5e01b125457dfed2aa3621609b8af2eb833b956f076fb0f9bc65a9df4cba5b95c037126a69f23a68aad9782ad35aa69778ea13a604e0a054456632e57d5a2dbf73a62cd945a9294d2f8086f73b17a64cc952e84f39a29fabca7b315273b23fac9a8837347a113dcec3d036402cb583f2d4585c4a594884c68cf78808dabf23951b441b0de34a936d5ce98bd8c200944034552e31f019f3390372d794f123653d9e93ca0b194828c23cdd40c582af679a805cedbcf5b97064f267fd262a2b5c158e940abf971ba4bfdd7ad6d6aeec407c1e763a3a9dc749daf40d1f360aa5b5f42249f4f66936345550244d5be211ac4da30d9fac6b9bb8b0b90ccebc648e0a62a02a668076c7112767364a632f0d029f992845866a5aef90768299b40ef02832836d04f65e4f88dd092b27b056769749595a216e314adfe51704d0aee231a219e6e81fda88e44f9d84d2357b3cfc96cd735630e1ee9e1bd7c597bd88f6c0f21c782470c626b6bfa28fbb9d0ce4cec53f50854c35b974a8a1f10612053e20966874fe98b9fd09910bdb15eafec30e9d70a08d7b479f439a095e513097eeef23be267a2d13e5fc0253c54db8c2b0ac32f7d51f22914cdd52ea166b3e480a48a35751aac71de8bf1e3d4e7a8a3fb64e8cc87c297f9fdf8c21e641fe1e4a4be47945fe3d0700ce78e72ce2ec75f0cec0451ef75eeeb037fc2f758740592339675b12b42ab8eca3e0745f2f6e0682db7bb8da496acdb91ccf16e15d1f52594b9811ea5d44b139716470566ee70381d2b6498967c3768d0adf3bbd00f92c8d7728ee4afcb95067959d59feae0fbafea5f86503e61b3080a575f23d313feea5759556f4df247b866fdd70b60df6f84903e9ac85481d837835d7a07c08299ae9c74064957662ffb637e3ed537b6920f55fe4c81f5298a49d9aad5dd6621dfb6848e0be0126dd66c0e0c880c989e5587bbf852bed010eb966c685a7ccdef6a02c84f058dd801c43acb28a9c26ca5cbb6b0d9e3b77afbdf520567d85ab34d67364fee9d3980c872752ea72e98edfcdc6d04ae034bd9b1c6f072ab1a1fa9fba816714340de3a2b169f7f860ce5c52d805ebd2a101db6f91d7be96245576c72c9430be2781477e541a64c4b18ef46c23f601358c043060878f4ef0bb4f74537e2d0e2798aa7bc36cb9dfc34f249be14e551e9f237681589c55cbf35e5e130b6cbc1f7cb05b152e4cabb757c6ad69738b931da28824e01d14aae5d14f7df748a7aaf7492c1c3ff25d03e1c7ceb4b9a72fd9e1605e99cdef97d1210107d8f4685c181326f20ebf0772633d71ea3ae2b897892854dfae316767bf455efca05651477e4f4ca1a1a41181d4d02d762827787c0394fb5a2fa962cc51fd216b3c9d2cdc51f99b9406a0764867f239f77950b12fc546638c6a842587cec6a6848c47d01065b5cf6e9e5b27c82055032d156748488d3213572be2f2d552a6c55b5ae4c78110102475f8538636afb06db45193f1415c5a7f3afffd70edf3f9f0f6a7c0f27a6e31f5aec1f26d77884db7e7d82250d97eebde7ca791dab21cf1dbe2b4bbdc4a618e75ea362aac018909ac77ad7d8101ef878b359aa47ffc05b8766eb7fa78c5d4dea5c4728234de4e1c5a5195dcee4c398dad82a5840368ea1eb0f38bb5a2c3ad511a4ea996773fff76be5b0676f4134ace0b9bf5e4da47f318a374177c12a74d0ebdbbc47d55e2ee1f22cfb2ae4d59907228f936e9b194fa1ab7cde220510355cad56fefa61c528289e10ebeb7f65dc1a1ee53b359392ae6029f87dddb7ebc880e27219d81519c48bf9f274e163d288c254aeb5baf69e13ef6daaae9f46de87502326c34bbff367205316172153182ec1dae6ffda8017b57062df35f966a74b65b3452d30c84a840ee7cea85878ec95ab9122a5c6d1edc7ea30f69e277dce230932fec605a5334ba15529a3f0783e236443f77c5a5cc83b01f2df1ee649a1532adbf1c7d19089a60da7a0563142e6ed71a6aba04d309b42d4ed799d5f95b0b5a611657fe78e0cd38ad5de59f6d0407d24c7480dff222ccfbe2c50c6e01d3b032c77e66a1243175ff4aef50dd9af7a5b4ff86e29be19200d8cf5e90b6fb55e840d9ae45292946c576c1d97c8789402ae4b6197f2dcf3dfd838391c9f327041e70f893ed12cadbac5867ecca7a9672f7d4ecedd552f4f910d1a7ac3f8daf6dab77c8d6ec9f6d213ec15c6cf2d25260617d705c6215a788413393606dfeaef1837c87b1a50063f0796d910da74410b62fbb29d7aed70884436ee76309226597f47f1a27a07584254f2171d024c12ac06a2443fa4bcf532fa5eb7f60ad8f0698a4025aba27db5bdc6c442dd38f95dfb5f66fb1d8bf09fdf6fc9451d121c6559e9c90ccc93cbc624a9201e536afcc36c2c9f738edcdf9d93afdbf148002916ba765965836aabb7bf3abd6a85a7289ff03c337cdfd090b2110373e75b9974b5660dc846ab3f974d0bfe02d2310f47d95378f65fe6c53c93c8220d427c555323a5cfd8c0f04b30594ff2d6431de9830f73a4edc8c9499d1ed02cec50bdc04468d4dcff69298a252b8d7d72004776eedcb08fe2da0b20dc650f22b49892a5f232365c62c52d03c08320a0adb24a22f15f50cc3356adb750e498ed67c0d18eb82b2cd4e3de24b65303894dd030e1eb11f6f9e1419ba05735fdf7554360c2cba293f13356c56b02ef7ce9991bb1ce0e2c2b08984c1a0bab7dfdcc7337272112315f0447c41a404bbbb9e9647db013c56a9551ef945b2e72599cb4eb945114f1927a919036d17154e284d0de50311becf1a255ddda9c5cffc40780fb3caf49a48d724044660f6da7a2203bb8101a87b1cbb79b537f6ef24c8dc7e94ed2ef4cce6fdd8a091e08c566adcb9f9cace221d54c236322f49f08fd4a52861fb10294e4caa14a77d065ae345be13630219a45cb99f3e3302bf8d853493e4b9b0968ea53e5a33b359d7cbe5eb271d1678ed22f5a1e8735e5a7c45c1fe0b362f8d8e6ceea5461a137dbbc957fe3fd9e5e73e68d79371f5baa22b1bc7ae5a29496684bf3d9c608d0b05ece0a6a4d0711e36b092ff0f0c899090b5c8b8d5d6700fcd351b8aef81b444060c8355cb2bd04634c470196543dc200f962952ebb44fe2052f4e1a6ebc31499e136d536ca9bf0a703b15361033e8033d575762d49147f2e96473cf3dc5b2d9503863fdab482ce443e1ae8430289d1a73f849a5e46819004fd2e2da41725a065604b02bd13b170096c255a4891dc0a297cade5a403407b7b8df5e34bec079abc87780ab4b40a8d438937a9bc83bbde7ef4b0363ee66de5a9177c34ba80ff01ab77d7386fa1543c4e6d3b78322d381c31948342fbf27b93deaa0a28837dc3570da597108d792fa6383cf5d052f9c8068effa506329eb32a8aae31a6d1e10cfb5b134c3ce1a5731f0797afc1e2", 0x1000}, {&(0x7f0000001240)="b28a6aeee7cf5d2ac57cfdaf21222724fcce38604b117d08aeae1d74a90e49e777960e7f85414baa6c231ed5b9c28011a5de1e18e8324492ce5033dff29ce4a55635818e0b33c2f13307c67cf5f4f471d6f8417866aa32ae9adf6455681ee5f47ab00f32bdd781f6056b602c19a207d196c280cf56172fe60eb511f39739681435c08fbd5b5ac79d055b8117ecc2236c40fbed01c729d3", 0x97}], 0x2, &(0x7f0000001340)=[{0x48, 0x0, 0xd496, "06caf3d3db372ec4ff458e6157d85f2226f5c49f2e00711b53811a6923c5378aa20f3db90ae80fb7413b3a5aeaefc692173fc0cbdf"}, {0x70, 0x107, 0x4, "dfff4e573ad0da9af44440d7f4add96214d4e44b25f3fc40c5c53c2754eca08520f10e29708102a686f1ab352f49c9a158a0c4b898ab58cda8580cccc12b5840ff7376e0957d07c80baf80c3342b8e6383e0a91e52b0970dd91d2a"}, {0x58, 0x11b, 0x2, "0da6fb6d9403253fecdc1244a65c3d37b66dbe8efd7d3384cfd5ceaa2f82ec97124e8462255442e66ce47adce5434c6df680566507caf957ae8b9a154f380296b8de5b4e"}, {0x30, 0x111, 0x0, "2a425642b5711b4bdca801b413ea9cbe301bd7e8fb97be2c518a"}, {0x80, 0x11, 0x1, "3fca28c09e5aef262324f14345251281b3cc1c273677a8940f3597019cc419e1bee81ffeed2f410da535a416cc7b409d6dc3b7624a656d42d88ee48c5d56d2c234872aecbfd0f97efbc759ae7c40c670b3fe8c5c41d95c3f7c65e8b330dfa22340b97144bb1deb7f6fc3c02e"}, {0xe8, 0x0, 0x8, "6fa5acb2d565cf0191113e80683a5e2c16ad6b574ff9817919d5783e80937c3e72a9ce72a9da26c31c93201f6e1326bb393c0a225aed59d994e38bccb593d0e053d658dea0604120976cdabc63c26cad2f244909612126b801680ae6e8113fe0cf2ce4a06ce28955c301a43777faa1f84ae97e776732a5d70f9c194e832ed7c57d8b42e1196953bba3249587f82d5496ae488fe5a411f5b8e492962fbf9a7ed8ce40fddc3417897cae3a4841428a7881fe15adef904c84c4bf305adcabe9e727c04e0ebb4e1679040d60b5f5513b861e7f"}], 0x2a8}, 0x8080) r1 = socket$kcm(0x10, 0x800000000002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) r3 = fcntl$dupfd(r2, 0x406, r2) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f00000001c0)=0x4, 0x4) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000001640)={'filter\x00', 0x9a, "f55a1f9893478b1c225293cb7c6c7c356fd0c2e821dd5d9aa3600b4d342b403aa335d5b6754b1360f92c98d0befde783b000c345d1e9322e419d7201faf8904b4c39463e55fccd2a21189c2f81d33ef4ac81acb4c8c84f6837b57e5cfef5a3ceb2ba0231a0af4cf80ed3cf53c9b6ed5ba7294cd0182f0ee8f125ef8dd8429bbaf92f00d62b9c62818110c9a7aa27fde47a8884c25705c97663d7"}, &(0x7f0000001700)=0xbe) 10:32:37 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xa2000000000000}, 0x8) close(r0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x540, 0x0) accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @broadcast}, &(0x7f00000001c0)=0x10, 0x80000) futex(&(0x7f0000000100)=0x2, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000080), 0x84fffffc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:38 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ptrace$getsig(0x4202, r0, 0x2, &(0x7f00000002c0)) sched_setattr(r0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x80000000, 0x2, 0x2, 0x4, 0x800}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500def2649d00009100000000000000a052c5252848f6eab7ff5505a894ad093729b930cb4350dea6089aceb7b85f8dbd6c994c1ad8d4b2e2e3812e97415cef4f8cddda8171b8c82981f9c71f10d95f6f740c9028c8c541f86a2c0a60f9fa8318fd4d17958c007e722745ef3bb6d997d7e0710b0a152d2c6b59c65d63db576f5bd378a2f5a4367cd686f417775b1c8b41087df26583b44ee48c14ea5f8b650fdfdd2ea3cbcdd795e5e4f7c32f69b20d700bcd9f45f230cd33d32e6c65facf7570d0aec3abc218cf"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xffffffffffffff56, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:38 executing program 3: socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="850000004cf8f014c8f2e1a957080000009533fc8a12123a4b0b000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 331.078336] futex_wake_op: syz-executor.1 tries to shift op by -1; fix this program [ 331.199785] IPVS: ftp: loaded support on port[0] = 21 [ 331.503187] chnl_net:caif_netlink_parms(): no params data found [ 331.587246] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.593958] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.602458] device bridge_slave_0 entered promiscuous mode [ 331.617159] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.623880] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.632654] device bridge_slave_1 entered promiscuous mode [ 331.672945] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 331.685198] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 331.727628] team0: Port device team_slave_0 added [ 331.736763] team0: Port device team_slave_1 added [ 331.917138] device hsr_slave_0 entered promiscuous mode [ 332.052649] device hsr_slave_1 entered promiscuous mode [ 332.268673] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.275301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.282553] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.289096] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.392100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 332.419230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 332.429588] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.441337] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.456942] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 332.479399] 8021q: adding VLAN 0 to HW filter on device team0 [ 332.499930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 332.509024] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 332.517275] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.523814] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.595250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 332.604169] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 332.613023] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.619524] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.628756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 332.638284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 332.647809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 332.657002] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 332.665957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 332.675136] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 332.684080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 332.692736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 332.701210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 332.709837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 332.721272] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 332.729800] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 332.782216] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 332.985188] __nla_parse: 5 callbacks suppressed [ 332.985211] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.4'. 10:32:40 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000001240)="b28a6aeee7cf5d2ac57cfdaf21222724fcce38604b117d08aeae1d74a90e49e777960e7f85414baa6c231ed5b9c28011a5de1e18e8324492ce5033dff29ce4a55635818e0b33c2f13307c67cf5f4f471d6f8417866aa32ae9adf6455681ee5f47ab00f32bdd781f6056b602c19a207d196c280cf56172fe60eb511f39739681435c08fbd5b5ac79d055b8117ecc2236c40fbed01c729d3", 0x97}], 0x2, &(0x7f0000001340)=[{0x48, 0x0, 0xd496, "06caf3d3db372ec4ff458e6157d85f2226f5c49f2e00711b53811a6923c5378aa20f3db90ae80fb7413b3a5aeaefc692173fc0cbdf"}, {0x70, 0x107, 0x4, "dfff4e573ad0da9af44440d7f4add96214d4e44b25f3fc40c5c53c2754eca08520f10e29708102a686f1ab352f49c9a158a0c4b898ab58cda8580cccc12b5840ff7376e0957d07c80baf80c3342b8e6383e0a91e52b0970dd91d2a"}, {0x58, 0x11b, 0x2, "0da6fb6d9403253fecdc1244a65c3d37b66dbe8efd7d3384cfd5ceaa2f82ec97124e8462255442e66ce47adce5434c6df680566507caf957ae8b9a154f380296b8de5b4e"}, {0x30, 0x111, 0x0, "2a425642b5711b4bdca801b413ea9cbe301bd7e8fb97be2c518a"}, {0x80, 0x11, 0x1, "3fca28c09e5aef262324f14345251281b3cc1c273677a8940f3597019cc419e1bee81ffeed2f410da535a416cc7b409d6dc3b7624a656d42d88ee48c5d56d2c234872aecbfd0f97efbc759ae7c40c670b3fe8c5c41d95c3f7c65e8b330dfa22340b97144bb1deb7f6fc3c02e"}, {0xe8, 0x0, 0x8, "6fa5acb2d565cf0191113e80683a5e2c16ad6b574ff9817919d5783e80937c3e72a9ce72a9da26c31c93201f6e1326bb393c0a225aed59d994e38bccb593d0e053d658dea0604120976cdabc63c26cad2f244909612126b801680ae6e8113fe0cf2ce4a06ce28955c301a43777faa1f84ae97e776732a5d70f9c194e832ed7c57d8b42e1196953bba3249587f82d5496ae488fe5a411f5b8e492962fbf9a7ed8ce40fddc3417897cae3a4841428a7881fe15adef904c84c4bf305adcabe9e727c04e0ebb4e1679040d60b5f5513b861e7f"}], 0x2a8}, 0x8080) r1 = socket$kcm(0x10, 0x800000000002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) r3 = fcntl$dupfd(r2, 0x406, r2) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f00000001c0)=0x4, 0x4) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000001640)={'filter\x00', 0x9a, "f55a1f9893478b1c225293cb7c6c7c356fd0c2e821dd5d9aa3600b4d342b403aa335d5b6754b1360f92c98d0befde783b000c345d1e9322e419d7201faf8904b4c39463e55fccd2a21189c2f81d33ef4ac81acb4c8c84f6837b57e5cfef5a3ceb2ba0231a0af4cf80ed3cf53c9b6ed5ba7294cd0182f0ee8f125ef8dd8429bbaf92f00d62b9c62818110c9a7aa27fde47a8884c25705c97663d7"}, &(0x7f0000001700)=0xbe) 10:32:40 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="85000000080000009500000000000000a063660d194dd35203a570ac0e2f792cb8d71ec979d86d6412cf73948bdb529b924b1eec5c8f866e2519ee1d79ff73ecf6e5cbb02fb4d7071270cc6db6639e7367af0715730f4ec734c4d0c20321a5ebd5a920e449b18d1068d8a8f8b01c11c147ddbb8f95e279567d5d3a08191334de3a7f32194714a84358ca3b608ca114370c95dcc9dfc57d9990904d5bda60e4506fb11553e30fcbc243920613968bcb100e56960805705c1a006d6b7ff6bfeaf9c9790daf08fb598663f2f96ffd3827a7dd604fd70881c1acf2d269db6db964fd884a029852141db1df4275007c8c532aa9ba5e"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:40 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xa2000000000000}, 0x8) close(r0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x540, 0x0) accept4$inet(r1, &(0x7f0000000140)={0x2, 0x0, @broadcast}, &(0x7f00000001c0)=0x10, 0x80000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:40 executing program 2: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000140)="5b48cf20a664b3bb2a521c4ff9b5825a9f0ef6b5cf6631b028a11abd4d", 0x1d, 0xfffffffffffffffd) r1 = add_key(&(0x7f00000001c0)='.request_key_auth\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="6c20daf3ceec341fd10f83bf07f1bb064a62e268f338f2cc273dab77b9bd1cee725cd73ff765c5299d2a11a569a4054225e6638e9a1b0e4d69b704c1880f15b5a7b0f4757923d7f3d479342f91e62f0862939f06a7588f0982c5618f9dc9836778681f489377791f7117f375d2e09e8347ad0ad9b83591bb0e2a9f9fcdfc9d05abd9823f1f679b9512f18568278d9f1e443d6d90b4788023f12ed8d6a138e6225b56e4a5db41b78c5dd0192704e9b50e804cf953c5160abf12451e2d324d6d9658a2937183", 0xc5, 0xfffffffffffffffa) keyctl$unlink(0x9, r0, r1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0xfffffffffffffffc}, 0x48) 10:32:40 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x100, 0x80000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0xfffffffffffffee4) [ 333.206120] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. [ 333.231984] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.4'. 10:32:40 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xa2000000000000}, 0x8) close(r0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x540, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:40 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x8000, 0x0) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x4) connect(r0, &(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x4, 0x2, 0x2, 0x3, {0xa, 0x4e24, 0xeb, @remote, 0x2}}}, 0x80) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000080000009500000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) recvfrom(r2, &(0x7f0000000040)=""/69, 0x45, 0x40000000, &(0x7f00000001c0)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e22, 0x2}}, 0x80) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x10000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r3, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x282001}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="e8000000", @ANYRES16=r4, @ANYBLOB="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"], 0xe8}, 0x1, 0x0, 0x0, 0x4}, 0x800) 10:32:40 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f00000003c0)=ANY=[@ANYBLOB="850000000800deff9400000000000000731fcbe3b2504b9b3274d9e140eba58af0968900000000d71e59955f6a3903c0e123a0606f1f92f3413adabcbea31d4131f5993e22868a0238978d99aed31642d8c3bfaa572ebf7d676089fc79002000010000a3766fdfecb19874c71c0512ccb9f56ccbb5c10d1620d9fdf6befc9e35ae82a9b001afd1e16bbf9200000000000000ad76545f34bc8ba9965e7c61244aac9feef8e7e970ca28f6488b572f867a934477c6f4ca47605776c7cf3ecfc100000ca438e07231f80b6ec635d562cfa63e4ad28f71875b91b79bb96653cfacaa1b2322d35944a95dc3f1d23f8535e129d57454"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=0x0, &(0x7f00000001c0)=0x4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000200)={r3, 0x1, 0x8001, 0x800, 0x0, 0xe1}, 0x14) sync_file_range(r2, 0xca, 0x3, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000240)={r3, 0x8}, &(0x7f0000000280)=0x8) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000004080000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:40 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="03000000000000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:40 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xa2000000000000}, 0x8) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 333.678483] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8000, 0x1) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname(0xffffffffffffff9c, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000340)={@multicast1, @broadcast, 0x0}, &(0x7f0000000380)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in=@multicast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) accept4(0xffffffffffffffff, &(0x7f0000000680)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000700)=0x80, 0x80800) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000980)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f00000009c0)={@loopback, @remote, 0x0}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000a40)={@empty, 0x0}, &(0x7f0000000a80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000ac0)={'ipddp0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000c80)={0x0, @broadcast}, &(0x7f0000000cc0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000000d80)=""/216, 0xd8}], 0x1, &(0x7f0000000ec0)=""/4096, 0x1000}, 0x100000001}, {{&(0x7f0000001ec0)=@in6, 0x80, &(0x7f0000002040)=[{&(0x7f0000001f40)=""/101, 0x65}, {&(0x7f0000001fc0)=""/100, 0x64}], 0x2, &(0x7f0000002080)=""/13, 0xd}, 0x4}, {{&(0x7f00000020c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000002600)=[{&(0x7f0000002140)=""/68, 0x44}, {&(0x7f00000021c0)=""/60, 0x3c}, {&(0x7f0000002200)=""/236, 0xec}, {&(0x7f0000002300)=""/185, 0xb9}, {&(0x7f00000023c0)=""/207, 0xcf}, {&(0x7f00000024c0)=""/28, 0x1c}, {&(0x7f0000002500)=""/157, 0x9d}, {&(0x7f00000025c0)=""/46, 0x2e}], 0x8, &(0x7f0000002680)=""/84, 0x54}, 0x2}, {{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000002700)=""/165, 0xa5}, {&(0x7f00000027c0)=""/101, 0x65}, {&(0x7f0000002840)=""/2, 0x2}, {&(0x7f0000002880)=""/239, 0xef}, {&(0x7f0000002980)=""/195, 0xc3}, {&(0x7f0000002a80)=""/34, 0x22}, {&(0x7f0000002ac0)=""/3, 0x3}], 0x7, &(0x7f0000002b80)=""/202, 0xca}, 0x7fff}, {{&(0x7f0000002c80)=@nl, 0x80, &(0x7f0000003e80)=[{&(0x7f0000002d00)=""/16, 0x10}, {&(0x7f0000002d40)=""/21, 0x15}, {&(0x7f0000002d80)=""/242, 0xf2}, {&(0x7f0000002e80)=""/4096, 0x1000}], 0x4, &(0x7f0000003ec0)=""/45, 0x2d}, 0x5}, {{0x0, 0x0, &(0x7f0000004080)=[{&(0x7f0000003f00)=""/81, 0x51}, {&(0x7f0000003f80)=""/239, 0xef}], 0x2, &(0x7f00000040c0)=""/4096, 0x1000}, 0x7f}], 0x6, 0x10002, &(0x7f0000005240)={0x77359400}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000056c0)={'ip_vti0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000006d80)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@remote}}, &(0x7f0000006e80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000006ec0)={@loopback, 0x0}, &(0x7f0000006f00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000006f40)={{{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000007040)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007140)={0x0, @multicast2}, &(0x7f0000007180)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000072c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f00000073c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000007400)={'team_slave_0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007540)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000007580)={{{@in6=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000007680)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009380)={{{@in6=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@loopback}}, &(0x7f0000009480)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f00000094c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000009500)=0x14, 0x80000) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000009e00)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000009dc0)={&(0x7f0000009540)=ANY=[@ANYBLOB='L\b\x00\x00', @ANYRES16=r1, @ANYBLOB="23082cbd7000fddbdf250100000008000100", @ANYRES32=r2, @ANYBLOB="f400020038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000500000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r3, @ANYBLOB="08000700000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r4, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="7c00020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000600000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000200000008000100", @ANYRES32=r8, @ANYBLOB="7c00020038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000ba4900030003000000080004000200000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r9, @ANYBLOB="080007000000000008000100", @ANYRES32=r10, @ANYBLOB="b000020074000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000044000400550b0903fa000000090074007f0000000200d3ab810000000600ff000400000001002105ffff0000050005070200000001fc06a009000000ff01ff010000000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004003f00000008000100", @ANYRES32=r11, @ANYBLOB="2c02020038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400080000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r12, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000400000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r13, @ANYBLOB="080007000000000038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400b4000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32=r14, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b75700000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r15, @ANYBLOB="080007000000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000400000008000600", @ANYRES32=r16, @ANYBLOB="08000100", @ANYRES32=r17, @ANYBLOB="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", @ANYRES32=r18, @ANYBLOB="080007000000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000100000008000600", @ANYRES32=r19, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b75700000000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400fffffeff08000100", @ANYRES32=r20, @ANYBLOB="7401020038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400020000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r21, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r22, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040081000000080007000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004001f000000080007000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b00000008000400010000000800070000000000"], 0x84c}, 0x1, 0x0, 0x0, 0xc800}, 0x4) 10:32:40 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg(r0, &(0x7f0000001540)={&(0x7f00000001c0)=@isdn={0x22, 0x1, 0x5, 0x7f, 0x400}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000240)="58d8c9c908edd8bf234e49fce921cdf6da17148b6c5f3a1f34d6c46c51f41dee23cbbc1cffb995f48b5ba5933d77ee408dc3dafa3badb0be693efc883ec1896d6810a7bc341b8313", 0x48}, {&(0x7f00000002c0)="01d9aa69a23b0e81c747b2469d483a49bebea4ad800ee09cc10c9b01f4188ea61ce4085a0dffa8310c41888921838e0107f30ac8f773b4b2925cc84fdc08a39d0270ee07d251c8d8334ffdce7c76e375d27be5cbc4e26c4b70d13d30a3b016f9c5c3ae0413d4c6b51dd487236698a169ce1f146a6a9a33e48134a75ece5b66bf5254629f2479897d0e70a407a5e0fbad63e0e25e27130d53f89c52664c118e28286e078fbb9a8ca721711d692e1656f016cb89323ea9f76d0eb612bc3d09df0a75bcbf861e1f76325f287326", 0xcc}, {&(0x7f0000000080)="71ea9f0662", 0x5}, {&(0x7f00000003c0)="563711f66173b6c16f723f6737f6faee4a5af6a6ad20cbe2edfa54f9286d9f50838451696d2d26c9c8f8013fe2df7b45d44b33a4fb6fc4dae0941ddebc365b30e44c7c09c05dbd21373f7dbb43e32e91694dc2bc6ce360d721bbf57b2d0322a4773f67082fc89603188a42547ae88a67f6ec6d18", 0x74}], 0x4, &(0x7f0000000440)=[{0x1010, 0x115, 0x20, "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"}, {0x30, 0x115, 0x5, "467e76a3396dc1ff990c2a4a85c6d54826230016e9ac545ffad9"}, {0xa8, 0x10c, 0x8000, "30dd0061a83c202ec75ce75feddf40b229ce7da0fec63fcd9b41d1e33cc7d1f95d5c21e5a528bad45b44417af804dbd4cc4e03212255a664eb0d006e23ade71be4b7a54b4c48c90e038a1fcd3fe27ab1d1ab78567131cc6b88cbb39c6f0ae045b660b447bc54a68504b6f32c049f6c582aa5f531340665c5a3c8c424dbba57f8043624aa5d22a81fcbfdd25945616bd07b8762"}], 0x10e8}, 0x4) 10:32:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000004080000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:41 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="9b000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0xc0000, 0x0) sendmsg$alg(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000200)="4813a0a908f63447f1dacfe0a332577bc98aae8fbb4d5043f886dc9ad91241f3bc9dedfd795393b429d345a1c64ef546d2bee6e2fd41b9e670e7a7af79005d594be51e96434b774b2164f63d258db25013a41c8bf8a679ceb56c41dfe2a7172038dd552e067a2c6f52be547cf82f4b9d37e44e2abe5ae8b97a5b899e21c556dfe84f1dee99fbcbc636a68baf65c051df5b1629775d557d11cb49354a51e1c2fe3e4942f6e7cb30acae599b4f5f66e2635ac291b54419610d553b251dac1a2f6f65eb33a8f86ac5812c35a22522b84007941ba85d99d23fc04dacb20d4a49b00172e7003c54eeee8b4740c7d9e6b91f3695", 0xf1}, {&(0x7f0000000300)="cf83b29dd11c943e0e9aef0447b4117e5ab8f26de032dfaa931a7b0fe6ebe153640b28d5f63dd2ddb373862132b7e656b8081d6973066ecdbfc9a01a365857e72c792abf508b54c7b290f6a06dd0a3606a820411ec3a5d0a862d3e4f9f07943b36a7b184656e374841cbfd5f5e421e4944d0c442478ddaa6f1b11aabab1330f0c0529819cce245c2a2121d691737583b21a42698e92e3291b19191c4954cee91554802e03946f452e32a9114e27dbc154c0775625b7cd745b3298abaae5b5a043ec487c04191d3f2ccbda0ea7d6ef76ff0c34b7b546ae3697576568ffc07", 0xde}, {&(0x7f0000000400)="8d478e60f1b23cb5b2059be2f500f9cc4ae893a35d777550dc50c398feb3104aab85f790b89de1da53259e2d557375a8499061a6cd761aa200945e0280dbb95bba07c97562f38c9d6583567da04fdedcae0dc1280a5b83bdf6e8869ebe0b11ff72662b020b50b5ebfb66984ac9ed935a754e79286e80528635046bbd3ea9ae9d0f9ae7885f17f929971e866240b19c326beea25f344edb7b9946c7ea0cd1d9969413bdc82327b4b832a5d6489911a9445406c2ec", 0xb4}, {&(0x7f00000004c0)="119758f027fd19557dda8a96", 0xc}, {&(0x7f0000000500)="ac920febdca9b4e232dccc9324452f841adf957aa4b9fe09b5bbc5d62bce9c5cbaedca4ac2980489607e6a33d97e950ecc21185bd8cfcc98b6cad87dc5d6de08042ecc553edf19f59a667f537d35eba018fc079160b20c6c5e4e4a5cb3dcd8a8c85713da8e0ddaf49adc7b5734502c07fd48bdb78061be0ab78e0956e69dccea2235d170f94a3528d323203c33fe18871644dd6d187225fde9b11b6f5b6dda18a5cd6df75a6e9efb5fffeefeae6cc9e5366e0a32fb21c6a8bc160d122095bcad8fed75394b20cfbc03678f7d7a1a680aab13a4a60572449415a75b40e5e0", 0xde}, {&(0x7f0000000600)="4e01", 0x2}, {&(0x7f0000000640)="d0628ae1b4fd87c337f1e77d584ddc2fa0803e236e13574d41d9369d0737c5c0ca5d84d782eb76d0dd9b64d9d05e8ae43def18d98d51f8927d78c6e5ddf4d8e6d7474d8580071db9a9434d6c0775f5d6c9f449b3178400bcc458b0de3f8172102808ba5af07167f4096fba96c090eb8acdaa4be269608cc4293e84428e1c", 0x7e}, {&(0x7f00000006c0)="21b866c4acb730b41e5bf2e1ce89e967de325e633b98c5241ed4bae9a735ee592dfb7bd985aa50803660988b606c014ba0dd606aaf9d25b1543dc849784f0d721eca3399ae12b8e45069821d318f5921ae460a85e58e6609abc08a94a85f51953c5006a76fb9ed0bd74f8f81d33b", 0x6e}], 0x8, 0x0, 0x0, 0x20000010}, 0x20000000) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:41 executing program 1: signalfd(0xffffffffffffffff, &(0x7f0000000200)={0xa2000000000000}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 334.120200] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:41 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="85000000080000009500000100000000c7cdd9cb93d529e4d0001f3eff738936fd41a1cbe46e6d763434fab774af8526c734444ca6458731cb11d5746a4ca70dd363bb89d07d3d884ae2a2803dbd820709c96e6248bf552a398981e41e02ddea877a6064a7ca5baf8d93677ed12f4640056120ab6fb2e4c727261ab6e8df09a3c3f1846ea5e93386833fa3233aa44e0264d3"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:41 executing program 2: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000001940)={@empty, @remote, 0x0}, &(0x7f0000001980)=0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500100008000000e2d1e7750fa6330b05322f1a4808fd4ce9f6d8b0d13e00f07fa33d51219005034b86d16598a71515abe2b998adcf1a6a450c40238f718d3e31d9e3ee9482506402d4a415a1e24242b89a582e16fead3711e0826133c04b167e7344194f1dc68ffd7b77d9b5ff55b2f8c37ad3fd6bd92309226e640962fd6c92bcd61e049ce38f6097c49a2c7f48603b3d9cf937d6b3e12f6734bb7f5d83002596f626978eb8e186525f9f1a696930919416b6b52d9eff5a660a9884"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xfffffffffffffda8, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r0}, 0x48) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2901, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000340)={0x1, 0x9, 0xbd, 0x2}, 0x8) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x8000, 0x0) connect(r2, &(0x7f0000000280)=@can={0x1d, r0}, 0x80) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f0000000140)=0x1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000080)={0x3, 0x1, 0x7, 0x6}, 0xc) 10:32:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000004080000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:41 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="850000000800000095000000000000003dba2ed4f040ec15c17701870ff8d4f99f5b895985652cedca3f85f6e5065cb3e8e489c6c951445aaa2b5c7ad16d148f4d8beb60ada77c5dab3e6a4dbb8bc162b936ba6d07f37d41140a1e5c4dca595c8e0c86d72e0d20ff7b1d71f4cfac38faa2580b10894308e1833c49a3000000000000080000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000240)=@buf={0x69, &(0x7f00000001c0)="74d6e8d6c5fbf757c1cb95da2283c82fb02de058f35f2ca4dee5b8b1dee1983dd041e15dfc8011debe8ee872389db9d9701240d06948372fa96f2a7d8594e486f1f7d2b502ca819c3a9f6dff8617768da6bb48441e1abc32d572e723dd7d3cef7a548c6f0c253ca366"}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:41 executing program 3: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x4040, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000001c0)={r1, 0x0, 0x10000, 0x5, 0x43}) r2 = socket$kcm(0x10, 0x800000000002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000080000009500800000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000080)={'team0\x00'}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000040)=r3, 0x4) [ 334.606033] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:41 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 10:32:41 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 10:32:41 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x3, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x857, 0x7fff, 0x40, 0x7, 0x2, 0x7, 0x8, 0x2cf, 0x40, 0x7d, 0x7, 0x4, 0x38, 0x2, 0xfffffffffffffff9, 0x100, 0x1f}, [{0x5, 0x0, 0x0, 0x2, 0x3e86d3a0, 0x101, 0x6, 0x4}, {0x6474e553, 0xfc5, 0xfffe, 0x9, 0x4, 0x40f2a896, 0x0, 0x2}], "a4b6e76dedd69c19523fecc22d5271aabf5e42c529a2", [[], [], []]}, 0x3c6) [ 334.713171] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:41 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:41 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 10:32:42 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 10:32:42 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000080)='GPL\x00', 0x5, 0xfffffd4e, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:42 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000080)={0x6, 0x4062, 0x9, 0x0, 0x8, 0x3, 0x8, 0x583, 0x100000000, 0x179949b, 0xffffffff, 0x9}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="08cf850000000800f3ff9500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000000)) prctl$PR_GET_NAME(0x10, &(0x7f00000001c0)=""/145) [ 335.147721] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:42 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 10:32:42 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 10:32:42 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000080000009500000003000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x0, 0x0) setsockopt$inet_buf(r2, 0x0, 0x2f, &(0x7f0000000300)="a6b11027b1eb766d7180fcf074ccaf5508805b56cf93368ed2280c81788f85d913696f1f23340e29fb0f9518acba34a95d855aa82497dadb139b32792f82bc7b752192f97e8785ce7f6e88d29f0a4169e845609364f8131b25bdd9550d3041c870bd40ac0ec74b0bdf60ce889a7d323731c1467e3f0abb9f894ae695a6487f1aeffdfb7f5ad942c1dc257602634b57c8a4df07de8c", 0x95) fgetxattr(r2, &(0x7f0000000200)=@known='user.syz\x00', &(0x7f0000000240)=""/165, 0xa5) 10:32:42 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r2, &(0x7f00000009c0)={0x0, 0x0, 0x0}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="18000000", @ANYRES16=r3, @ANYBLOB="01090000dbc6bf44bcec256f0cea0c9c2ecb26fa3e95e9c7e92ab1e551da0bafc10436e494680e33f97eeaef4f815ed4d6f18402e2cab31fede49166e71e67810500406eedd22ca0d9f8207ad2930000000000000000000000000000000011c4bcba9eecf69b17714dd541763db0293d27ed275f4172cb0737cc250c666b4029f5e3d873d3a26e12057101e296d8a06388fd399ec10fcf982d56c5abca568036ee09d5871f60e175d7d9a6376a2c389781b4b2de34f4b2191b72"], 0x18}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r4, 0x4) 10:32:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 335.574971] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x4000, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x8000, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000003c0)=[@textreal={0x8, &(0x7f0000000340)="d9f00f01cf66b8010000000f23c80f21f866350000e0000f23f8262e67660f080fc71e004066b8dc0000000f23d80f21f86635000000800f23f866b86d4900000f23d00f21f86635200000000f23f80f080f01cf66b9f50b000066b8fa00000066ba000000000f30", 0x68}], 0x1, 0x78, &(0x7f0000000400), 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x100, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cachefiles\x00', 0x40000, 0x0) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f0000000480)={0x8000000000000000, 0x0, 0x5, 0x1, 0x3}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x3080020}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, r4, 0x300, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x4, @link='broadcast-link\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4044000}, 0x20000040) [ 335.663827] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000004080000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:42 executing program 0: r0 = socket$kcm(0x10, 0x8, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="850000fdcebee1686ede6e3946c96e947163a06d80ea18a579f46635895c56743f38d4ef8f7431a89b9ddff257807f88d0c1ed02a9e0b98f4dd81ca4d59dc892d088a48265c6a27d28d06f3700000000000000000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x5, 0x8c0) ioctl$ASHMEM_GET_PIN_STATUS(r2, 0x7709, 0x0) 10:32:43 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000080)=ANY=[@ANYBLOB="a60700000000aa000000000000000000d851fba9"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'gre0\x00', {0x2, 0x4e23, @rand_addr=0x3}}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) rt_sigtimedwait(&(0x7f0000000040)={0x8}, &(0x7f00000001c0), &(0x7f0000000080), 0x8) 10:32:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:43 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) times(&(0x7f00000001c0)) 10:32:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000004080000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000080)) 10:32:43 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x78, 0x0) getsockname$packet(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x14) 10:32:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:43 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x800, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r2, 0xc06864a1, &(0x7f0000000280)={&(0x7f0000000240)=[0x6, 0x3, 0x80, 0x6], 0x4, 0x20, 0x7, 0x3, 0x5c70, 0x400, {0x1, 0x2dea, 0x3dd6, 0x9, 0x9, 0x5, 0x2, 0x31df, 0x10000, 0x1000, 0x101, 0x80, 0x45ff, 0xff, "104536fd5ba3482470a62d1b4acb6e7569109672f93bd1bea92b5f4ff5bf9f5a"}}) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f0000000200)) 10:32:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000004080000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:43 executing program 2: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) sched_getattr(r0, &(0x7f0000000080), 0x30, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="8500078018000000cf00000000810000"], &(0x7f0000000180)='syzkaller\x00', 0x7, 0xc3, &(0x7f00000001c0)=""/195}, 0x48) 10:32:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:44 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x500, 0x0) r3 = getpgrp(0x0) write$FUSE_LK(r2, &(0x7f0000000140)={0x28, 0x0, 0x5, {{0xffff, 0x4, 0x2, r3}}}, 0x28) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:44 executing program 2: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='sy\xd1\xfealler\x00', 0x5, 0xc3, &(0x7f00000001c0)=""/195, 0x0, 0x1, [], r0, 0x4}, 0x186) 10:32:44 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = dup2(r0, r0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x9, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x864c0}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffff}, @alu={0x4, 0x2, 0xf, 0x6, 0xb, 0x10, 0xffffffffffffffff}, @map={0x18, 0x6, 0x1, 0x0, r1}, @generic={0x9, 0x9, 0x100, 0x2, 0x7fff}]}, &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:44 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x1) 10:32:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:44 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000080000009500000000000000ca527a2adcd5c930bd2c19ea88430b6868ce369070259322c7127fc7b9a2b7a71078ed28a93cc8e9e9ac636b8b"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x8000000000040, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000080)={0x7, 0x7f, 0x1}, 0x7) 10:32:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="850000005f000000000000bfd3a7e25232b8efcb04000000d80c00d6435ef0c28f7d766359fa30647f8d10f8beba4670cda38c0af2f0b579b3156b95e91192041891bcb74b598d0f898ad82fc42e141e64333e8433d103607ee3ce2a221993b50a3fc8cb67b507879af61e365a7b88a29b7712289b247f1808320ccbfbee9f95e9be009bfad9712e6c53cb9ed615b252dcfd1c308e6e294aba633feef81c6b89dc92cb47c303fb"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) r2 = fcntl$getown(r0, 0x9) r3 = getpgrp(r2) rt_sigqueueinfo(r3, 0xe, &(0x7f00000001c0)={0x2c, 0x1600, 0x3}) 10:32:44 executing program 3: r0 = socket$kcm(0x10, 0x900000000005, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:45 executing program 2: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x5, 0x400002) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r1, 0x123, 0x70bd28, 0x25dfdbfe, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x2000000000000070, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x41f00}, 0x48) 10:32:45 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="850000000800001d0a6402ff00ffffff"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x3, 0x2) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r3, 0x703, 0x70bd25, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x40) 10:32:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, &(0x7f0000000000)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:45 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="85000000080000009500000000000000f7bc30000b4b9f2e57ee50f66e2f8aec3d9b00a87dd677cf19ad375d0b204234dd29193ad52d493f3f5c4f832c17680dcf5e3113a5675b25b28527d96e3f0d621fca1e9f6722ea533030ebc1952ac4b04c59da4022ee86bdbbfef7e9041e36713e4889291f8d9fb97c1d34344e3080bdecc4beeb08e9ddb823a1e75948f6ad1b62242acd65fe"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'lapb0\x00', {0x2, 0x4e20, @multicast1}}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000950000000000000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r1 = dup2(r0, r0) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=0x0, &(0x7f00000001c0)=0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000200)={0x101, 0x5, 0xd992, 0x3, r2}, &(0x7f0000000240)=0x10) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000040)=""/1) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f0000000080)={0x107000, 0xf000, 0x400, 0x1, 0x6}) 10:32:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 338.280168] __nla_parse: 8 callbacks suppressed [ 338.280191] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. [ 338.411202] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, &(0x7f0000000000)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:45 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x800, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip6_vti0\x00'}) ioctl$FIONREAD(r2, 0x541b, &(0x7f00000002c0)) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000001c0)=r1, 0xa742f5eaa842cdfe) 10:32:45 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000002c0)='/dev/vbi#\x00', 0x2, 0x2) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x1f3e, 0x14a00) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000200)={0x6, 0x80000001}) 10:32:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 338.896615] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, &(0x7f0000000000)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85002680080093201c5d800000950000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r0 = open(&(0x7f0000000040)='./file0\x00', 0x1, 0x2) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f0000000080)=0xf) 10:32:46 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) pause() setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x8, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:46 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="850000000800000095f77c000035b125"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = dup3(r1, r0, 0x80000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f00000001c0)={0x3, {{0xa, 0x4e21, 0x401, @remote, 0xffff}}}, 0x88) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1000000000000287, 0x0, 0xffffffb3}, 0x1) 10:32:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:46 executing program 2: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) sched_getscheduler(r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x8, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:46 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000340)=ANY=[@ANYBLOB="000000ace8fff72716d6760e000000000000000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) pselect6(0x40, &(0x7f00000001c0)={0x7, 0x8, 0xbab8, 0x6c, 0xeda, 0x9, 0x1, 0x1}, &(0x7f0000000200)={0x20, 0x4, 0x3, 0x4, 0x4, 0x3a, 0x0, 0x32d8}, &(0x7f0000000240)={0x3f, 0x1, 0x4, 0x0, 0x7ff, 0x6, 0x2bb9, 0x8001}, &(0x7f0000000280)={0x77359400}, &(0x7f0000000300)={&(0x7f00000002c0)={0x1}, 0x8}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:46 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) bind(r0, &(0x7f00000002c0)=@ll={0x11, 0xfd, r1, 0x1, 0x2, 0x6, @remote}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, &(0x7f0000000000)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f0000000340)=""/195, 0x40f00, 0x0, [], 0x0, 0x1}, 0x48) 10:32:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x8, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 339.707946] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. [ 339.781099] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:47 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85009a9164a167bc15d2fd27cff3e7aa"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000001c0)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:47 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 340.074081] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:47 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) pipe(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$FUSE_NOTIFY_INVAL_INODE(r3, &(0x7f0000000080)={0x28}, 0x28) close(r4) socket$netlink(0x10, 0x3, 0x9) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) r6 = fcntl$dupfd(r1, 0x0, r1) setsockopt$XDP_UMEM_COMPLETION_RING(r6, 0x11b, 0x6, &(0x7f0000000080), 0x4) 10:32:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:47 executing program 2: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80800) accept4$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x1}, 0x10, 0x80000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000440)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xb, 0xb, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6c7, 0x0, 0x0, 0x0, 0x20}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x10001}, @call={0x85, 0x0, 0x0, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2b9, 0x0, 0x0, 0x0, 0x2}, @ldst={0x3, 0x3, 0x2, 0x0, 0x8, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100}]}, &(0x7f0000000140)='GPL\x00', 0x8, 0xf2, &(0x7f0000000240)=""/242, 0x0, 0x1, [], r1, 0x7}, 0x48) 10:32:47 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x10001, 0x2080) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050decdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x211}, 0x0) 10:32:47 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000408000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:47 executing program 2: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)={0x0, 0x0}) sched_setattr(r0, &(0x7f0000000040)={0x0, 0x3, 0x0, 0x2, 0x81cb, 0x4, 0x41f, 0x2}, 0x0) 10:32:47 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="7b000000082300009500000000000000f62f3cfa38e6f0d5656901d4c8dadd45f74a49da8641cd333d707fb8d3d08ce904ee32c3030074451ba425d4ae5f618403db70db0dd3512a2ca38ff12984213433ca2317da55992f1dde02246336d814d6de4a109627b2f808b973643ed0d7a02bfa5d06843acab120d063de6ff26accce89050033c29ab6f2a9630574a4531336a60a9084c974f0b6666c90592f404c9295f3c33a62a02facb19e1f56c520963fe485ada5e776cbdd115eee901ee35f28f80b2b90301f5fc1c904534a0244662ea307fcc13c4ea4fbfdde82f59f23c5"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000002c0)=r1, 0xb4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:47 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000408000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:47 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="8500000008000000950000000000efffc0c16ac49019"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x800, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000080), &(0x7f0000000140)=0x4) [ 340.770454] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:48 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) bind(r0, &(0x7f00000001c0)=@in={0x2, 0x4e20, @multicast1}, 0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000240)=ANY=[@ANYBLOB="850000000800130095000000000000005cddcbc9fa816b2804d818b1879a8a8afe231c8fe4926fe2e4fb3cfaae3631ec5f7d5e6426049be6d79bb43ef59fab16ef773581ef7597e3f394e371b49d583f07c44715303eed51ec90188cf8c5aa"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 341.145074] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. [ 341.201883] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xf, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c9"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000408000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:48 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000008000100fdffffffffffffff"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:48 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x2, 0xc80c0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f0000000380)={&(0x7f0000000140), 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x124, r2, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x7c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x489}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8392}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}]}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x401}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}, @TIPC_NLA_MEDIA={0x78, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r3, 0x4) 10:32:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010329bd7000fbdbdf250100000008000500020000001400010000000000000000000000000000000000"], 0x30}, 0x1, 0x0, 0x0, 0x4040000}, 0x20000000) r2 = dup(r0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x74, r3, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="96af3f9e9e53140f7aef276347c4481c"}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x80000001}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x1}, 0x40) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0)=0x1, 0x4) r4 = socket$kcm(0x10, 0x800000000002, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000200), &(0x7f0000000240)=0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000040)=r5, 0x4) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xf, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c9"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="850000040800000095000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 341.578172] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x40, 0x7, 0xffff, 0x20, 0xffffffffffffffff, 0x100000000}, 0xfffffe7e) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000580)=ANY=[@ANYBLOB="850100000000000089b567d479174ec590acd1040cafae36cb6a2258f6a76f31348d16f88534f789c87bebcb47064617968951b9b8ae5be7fc49c50d052aea45dc326234aeda14a5c899e4f638c3839749134a3f8adc318a4caba20a309685d03155d2de896b20ae273367d92b6b5aa947f179df68d3897001b2d2d570ce3d14ede0a60edc8cedcd05a2fd5f11ccb5e4d1fa390a43306a034c740f689748c18b4f216b1d7646f70a84e48ce6eac7e735534258e467480ac4418886f1e737d03ce70e1a2bf1a406294e4e85c2522f6ff85f94519c3a4c2be786bad4bc3a8dfd88e9304b7563ea2779576af8c81940a7cb200fefd0e1de050342d438bf7de71f57afd3b711469454a4aec85814d1413c53781754a6cbf4a6e9789560eaf488f9c8b97d0831a8c4753dbf5acd9e6098ee539759097dbf449cb17797bafb44983d5fd9"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) pwrite64(r0, &(0x7f0000000280)="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", 0xfffffffffffffef8, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000240)={0x5, 0x1dc, 0x9}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x8) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000200)=0x500, 0x4) 10:32:48 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400000, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x61) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x105000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000140)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000001c0)=0x20) syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x2, 0x40) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000200)={0x5b, 0x4, 0x8000, 0x2, 0x1, 0xfffffffffffffffb, 0x8, 0x4, r2}, &(0x7f0000000240)=0x20) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in6={0xa, 0x4e24, 0x4, @mcast1, 0x6}, @in6={0xa, 0x4e24, 0x200, @initdev={0xfe, 0x88, [], 0x0, 0x0}}], 0x38) r3 = socket$kcm(0x10, 0x800000000002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000300)=ANY=[@ANYBLOB="85e10700004f90167a251ecf3f46ed63d4d2236770cfeeaf60f598590ac236d6"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r4, 0x4) 10:32:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xf, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c9"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:48 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000efff0100000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) socket$netlink(0x10, 0x3, 0xb) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="850000040800000095000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:49 executing program 2: 10:32:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de06"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:49 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000200)={0x8, {{0xa, 0x4e23, 0x1, @mcast2, 0x7}}}, 0x88) 10:32:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="850000040800000095000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:49 executing program 3: r0 = socket$kcm(0x10, 0xc00000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000280)) r3 = request_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)='syzkaller\x00', 0xfffffffffffffffe) keyctl$clear(0x7, r3) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000240)={{0x3ff}, 0x40}, 0x10) 10:32:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="850000000800000095000000000000009d545c02599e1df36be057cce756a93a3c57a597c149b35e4ffd92e28908bece6cc8bdb29d48c267820f9bbfb996721511cbe6cd0f0f2ce8049ba2a7119856ef9ef73efc9392e05b70c51500cc1d9df5d2e2e24741bdc20b458de9c581284ca47e37df054a9a33dcd0dcd9d421ec3d39d06e7d1d6d92e29edcdd78e67209e29ed33a4081c03d2628fbbab9e6b4a99d588b187c5433405364743afd75f2c0e48de12bee454067eae692b81e716142a0c69a9c691d6f49549c2cc5ae1f7f87c18c6d11d0b6958ca7"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de06"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000408000000950000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:49 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x7, 0x6, 0x2, 0x5}]}, 0x10) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x80000, 0x0) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000280)={0x4, 0x0, [{0x9, 0x2, 0x0, 0x0, @msi={0x1ff, 0x6, 0x100000001}}, {0xe87c, 0x2, 0x0, 0x0, @irqchip={0x1, 0xfb}}, {0x7, 0x7, 0x0, 0x0, @adapter={0x81, 0x3089, 0xffffffff817f56ab, 0x0, 0x1d7c}}, {0x8, 0x3, 0x0, 0x0, @irqchip={0x6, 0x7}}]}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000408000000950000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de06"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x1000000000000005, 0xc3, &(0x7f000000cf3d)=""/195, 0xfffffffffffffffc, 0x0, [], 0x0, 0xe}, 0x48) 10:32:49 executing program 3: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x20) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000140)=0x1, 0x4) r1 = socket$kcm(0x10, 0x800000000002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x19) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) 10:32:50 executing program 0: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x1, 0x2) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f0000000200)) r1 = socket$kcm(0x10, 0x800000000002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000880)=ANY=[@ANYBLOB="85000000080019009500000000000000a435975d7e443f34a61865ecb7e09cfc7e6752f8bb50a60d1f5f8b72ba9f34ce150c76df106cefd224dae28e7c15e8b37e18dad59cc20c221d10fc072cefe693b43ea9ca8bdaa3b0d6bac6be669fcdf96df65d07481f28f5ae10a0fc5122e83dcf3f1714621235f1c24831a653090a8f457da80fb75e2c8615926f99a7"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) socket$bt_bnep(0x1f, 0x3, 0x4) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x10000000000000be}, 0x0) recvmsg(r1, &(0x7f0000000740)={&(0x7f0000000280)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0xff67, &(0x7f0000000800)=[{&(0x7f0000000780)=""/127, 0xfffffffffffffed4}, {&(0x7f0000000380)=""/67, 0x43}, {&(0x7f0000000400)=""/86, 0x56}, {&(0x7f0000000480)=""/221, 0xdd}, {&(0x7f0000000580)=""/46, 0x2e}], 0x5, &(0x7f0000000640)=""/179, 0xb3}, 0x0) 10:32:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x4000, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x8000, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000003c0)=[@textreal={0x8, &(0x7f0000000340)="d9f00f01cf66b8010000000f23c80f21f866350000e0000f23f8262e67660f080fc71e004066b8dc0000000f23d80f21f86635000000800f23f866b86d4900000f23d00f21f86635200000000f23f80f080f01cf66b9f50b000066b8fa00000066ba000000000f30", 0x68}], 0x1, 0x78, &(0x7f0000000400), 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x100, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cachefiles\x00', 0x40000, 0x0) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f0000000480)={0x8000000000000000, 0x0, 0x5, 0x1, 0x3}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x3080020}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, r4, 0x300, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x4, @link='broadcast-link\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4044000}, 0x20000040) 10:32:50 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000080)=ANY=[@ANYBLOB="85000000080000009500000000000000974626eefeb3779b8a1f855a5d835029c19a6662f27fa697c5d2f9bdb899cf7d4561c8876edd5a512f0280"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000408000000950000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:50 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000300)=ANY=[@ANYBLOB="976fef50c8d9355600000000a1eb09e3f268ea91884c3c131200"], &(0x7f0000000040)='syzkaller\x00', 0x7, 0xc3, &(0x7f00000001c0)=""/195}, 0x48) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x256001, 0x0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000180)=0xb1) mkdirat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x1ff) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000002c0)=0x2, 0x4) 10:32:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="850000040800000095000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:50 executing program 0: r0 = syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x6, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x2) r1 = socket$kcm(0x10, 0x800000000002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:50 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000040)='GPD\x00+$\xbd2)\xb9\x05\xef\xd3\xd9\a\xa4U\xacp\xdb\xba1\a\xf9\xd6L\xcbx\xa8\x12#\x98\x83\xbf\xceN\xda\xc3\xe2\xb3\xea\xc9\x91\xad\xd2l\xa5\x04~c\x80\x8e\xd1\xcb\xd8m\xce\f\x84\xde\x9d\x81\xc8\x16*\xdeC\'H\xa2|C\xe0+\xf9\x16\xd9\xe0\xe4N\xa1\xc0\xf1\x00\xefO\x83l\x89\xd6\x12', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="850000040800000095000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:50 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="8500d9ba3879c7000008009500000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) [ 344.000683] __nla_parse: 6 callbacks suppressed [ 344.005648] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 344.385627] IPVS: ftp: loaded support on port[0] = 21 [ 344.500316] chnl_net:caif_netlink_parms(): no params data found [ 344.547919] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.554425] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.562189] device bridge_slave_0 entered promiscuous mode [ 344.570122] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.576776] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.584859] device bridge_slave_1 entered promiscuous mode [ 344.610125] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 344.620414] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 344.644827] team0: Port device team_slave_0 added [ 344.652801] team0: Port device team_slave_1 added [ 344.715882] device hsr_slave_0 entered promiscuous mode [ 344.752493] device hsr_slave_1 entered promiscuous mode [ 344.827150] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.833748] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.840621] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.847202] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.905802] 8021q: adding VLAN 0 to HW filter on device bond0 [ 344.921416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 344.930801] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.938177] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.947063] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 344.963098] 8021q: adding VLAN 0 to HW filter on device team0 [ 344.976058] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 344.984025] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.990438] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.004143] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 345.012600] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.019028] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.045073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 345.054880] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 345.073470] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 345.094237] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 345.102553] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 345.115339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 345.146227] 8021q: adding VLAN 0 to HW filter on device batadv0 10:32:52 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\a\x00\x00\x00\x00\x00\x00\x00G\xe3U:Q<\x16%\x98\xff\xf2\xbe\xeb\x88i\x16\x02\xb5\x83\x19\xf3w\x18\xd7\x96\xea\x7fy\x93\xd3W\xc4-l\xcf\xa5R\xf4RF\xf2>Ihm\xe2\x86\xd2\xf1\xd6\xb6\xff<\xa4}\xcb\x99\x9fq\x9dF\xe0\x90\xb3\xe3\x05Y\xfex\x0f\x17\xf7s\xd51\xdf\xeb\xa5\x03\xf7\xaf\xb0\x1d@p5\x9c|\xd3\xdc\xa8\x025\x87tTf|i\xc9\xa8\x95\\\xf2\xb5\ay\xc8\xc8R\x92\xf1#\x9bsm\xf6F\x83\xd7\x13L\x94\xf8}\xc7m>\xe4]\xde0x0}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x17, &(0x7f0000000240)=ANY=[@ANYBLOB="8500e09d08000000950000000000000038a50de1cdd92f490e79d1929a59a748225dbcb958dec5a659b90391e9dfdc7836db5ec48903c4da8526566eb328ad2071e00a356ef357c9cd514cbe86646f59f0fd7d06da45ca4bd82c65a140186437d8f1485d1d285df9efdb1451b39f97eea77dc3e3ba3ef08201286f324cd225a33d54214f4c6e81cac39d934063eeb7174bcba582ddc86c1f04b839ec2c367beae036f08ee56dd9e4f59d6a8f5090eddd7e6851bf50feb1ff04c1"], &(0x7f0000000180)='s\xb2\xf9\x1fS\xe3\x18\x1b\xf2t', 0x40, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r2, 0x400}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r3, 0x4) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="850000040800000095000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000080)=ANY=[@ANYBLOB="8500000008000000950000009ba6970838d00d8a3a75ffc43200820000f2c5bb7ee2772efeff55e00d6ddbd722ac0ff4dba7287cce2f"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) rmdir(&(0x7f0000000040)='./file0\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80, 0x0) getpeername$netlink(r0, &(0x7f0000000280), &(0x7f00000002c0)=0xc) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x101000) r2 = dup2(r1, r1) ioctl$IMGETDEVINFO(r2, 0x80044944, &(0x7f00000001c0)={0x7fff}) bind$tipc(r2, &(0x7f0000000140)=@nameseq={0x1e, 0x1, 0x0, {0x43, 0x0, 0x4}}, 0x10) 10:32:52 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x652) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000840)='/dev/sequencer\x00', 0x20040, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) sendmsg$nl_route_sched(r2, &(0x7f00000009c0)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000980)={&(0x7f0000000a40)=@deltaction={0x3b0, 0x31, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0xe, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}]}, @TCA_ACT_TAB={0x24, 0x1, [{0x10, 0x1, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0x17, @TCA_ACT_INDEX={0x8, 0x3, 0xffffffffffff8001}}]}, @TCA_ACT_TAB={0xac, 0x1, [{0x14, 0x1, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}, {0x14, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x10, 0x5, @TCA_ACT_INDEX={0x8, 0x3, 0x100}}, {0x10, 0x1e, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0x10, 0x1e, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0x10, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x1a, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x10, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0x10, 0x7, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0x19, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}]}, @TCA_ACT_TAB={0x88, 0x1, [{0x14, 0x2, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x14, 0x6, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x18, 0x19, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x10, 0x1b, @TCA_ACT_INDEX={0x8, 0x3, 0x56}}, {0x10, 0x1, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0x14, 0x1a, @TCA_ACT_KIND={0xc, 0x1, 'pedit\x00'}}, {0x10, 0x13, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}]}, @TCA_ACT_TAB={0x50, 0x1, [{0x10, 0x19, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x1e, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x18, 0x6, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x14, 0x1e, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}]}, @TCA_ACT_TAB={0x64, 0x1, [{0x10, 0xa, @TCA_ACT_INDEX={0x8}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x1231}}, {0x10, 0x17, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0xc, @TCA_ACT_INDEX={0x8, 0x3, 0x1ff}}, {0x10, 0x17, @TCA_ACT_INDEX={0x8, 0x3, 0x400}}, {0x10, 0x1f, @TCA_ACT_INDEX={0x8, 0x3, 0x200}}]}, @TCA_ACT_TAB={0x6c, 0x1, [{0x10, 0xe, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x14, 0x1e, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x14, 0x1e, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x2, @TCA_ACT_INDEX={0x8, 0x3, 0xb6}}, {0x10, 0x19, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0x1e, @TCA_ACT_INDEX={0x8, 0x3, 0xa4ca}}]}, @TCA_ACT_TAB={0xac, 0x1, [{0x10, 0x13, @TCA_ACT_INDEX={0x8, 0x3, 0xffffffff00000001}}, {0x10, 0x7, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x14, 0x10, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0x17, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0x15, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0x10, 0xe, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0x10, 0x9, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x9, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x14, 0x5, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}]}, @TCA_ACT_TAB={0x64, 0x1, [{0x10, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0x10, 0x1c, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0xc, @TCA_ACT_INDEX={0x8, 0x3, 0xdd}}]}]}, 0x3b0}, 0x1, 0x0, 0x0, 0x1}, 0x5) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) 10:32:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298d"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000004080000009500000000000000"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298d"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:52 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x5, 0x200) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:52 executing program 0: r0 = socket$kcm(0x10, 0x5, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="85000000080000009500000000010400edd5c833764225aa631cb92203762cbb28fd15dbc9fad879ffc35f6f80c695e5faed59235b5689e9d4c388b46d902f0c6a53f22d635897e7d1f9bfc86652ba0139930f389c130feb95b1c5070e5b447ed13e47a43ff0113d120e7c521cafce843606426b20315c4c7c1951fd7da8d02c4777b181a433e8547edf0098d93db4cee82bb585979d9bb285108b2d3bef5f3f68ac6c112386d9e8a28b308b95457518aeb2888b8bf14dc48f270ee36c3ad0aff2dba2df1b143ddc2c1f26ee3eb30ba72385"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000004080000009500000000000000"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:52 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x1}) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x9) 10:32:53 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x1ffff, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = msgget(0x3, 0x8822d12453c29a8e) msgctl$IPC_STAT(r2, 0x2, &(0x7f0000000140)=""/44) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000a7e8012bff322a034a300000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r3, 0x4) 10:32:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298d"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:53 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000240)=ANY=[@ANYBLOB="00080002009500da6f4cce7d41c00000000005000000009dcfd4034a5ad29521d99d1f597d620069a5725d31c9b8e8e5594dc359e9df2321b8dd2cdc33fd62d24cefb19f4a0c87ecb62a5a2a908d3e7759d9376ede2aa94e74a9b6a92f90025c186f3602"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$UI_SET_RELBIT(r2, 0x40045566, 0x1) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x101, 0x480000) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x80000001) ioctl$VIDIOC_G_FREQUENCY(r3, 0xc02c5638, &(0x7f0000000200)={0x3a4, 0x6, 0x9}) 10:32:53 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3, 0x4200) r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20011, r2, 0x0) r3 = geteuid() setfsuid(r3) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="116348400000000000000000000000000000000000000000a30648f254f80518e74b930101000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000004333171afa33f9cf1353fda8d05620868b8dfece6ead438f27fcd19af0ccf11a8043516d8ed911be5d296ea8d0cba7bd483962d8b0b6fc21b634c30cf27cf60872"], 0x0, 0x0, 0x0}) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x9, @mcast1, 0x720d}, 0x1c) 10:32:53 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) ioctl$RTC_IRQP_SET(r0, 0x7005, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0xdac) 10:32:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:53 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="ea8b5869d6df6c32498202007327ab08fee91bed9be393e28117dea850f6d3128579cef4c016b96ae211617b6def0fa9b7074b88441bfb908012d0cc2a3d794c54874cd15af49a575a7528ea00882668c37ec75b69da91ad9aa01b690d8ae360a833dec53390c6127f61af5f8e390510e123fb0d99796358c7a67bf52ab6f6e92ba2a47d596c98370a47d5455524b2a2cd48fc0c05aab377976876aa9930cf10aeff57961d2c76f1e0a90306319be40716dad5e666f9aedc01adadc5c20d4d6c0feb3ee321902a326a2d89fbfe00ccc5d6cbe2f0000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000004080000009500000000000000"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 346.358470] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. [ 346.445275] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. [ 346.546126] binder: 13717:13722 got transaction with invalid data ptr [ 346.553086] binder: 13717:13722 transaction failed 29201/-14, size 1-0 line 3053 [ 346.661149] binder_alloc: binder_alloc_mmap_handler: 13717 20ffc000-21000000 already mapped failed -16 10:32:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:53 executing program 3: r0 = socket$kcm(0x10, 0x7, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) [ 346.741300] binder: BINDER_SET_CONTEXT_MGR already set [ 346.746908] binder: 13717:13736 ioctl 40046207 0 returned -16 10:32:53 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r1, 0x7001, 0x0) 10:32:53 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/75, 0x4b}, {&(0x7f0000000240)=""/255, 0xff}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/138, 0x8a}], 0x4, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 346.792255] binder_alloc: 13717: binder_alloc_buf, no vma [ 346.797901] binder: 13717:13722 transaction failed 29189/-3, size 1-0 line 3035 10:32:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000004080000009500000000000000"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 346.892613] binder: undelivered TRANSACTION_ERROR: 29201 [ 346.903869] binder: undelivered TRANSACTION_ERROR: 29189 [ 347.049309] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. [ 347.092393] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:54 executing program 2: getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000000000)={@multicast1, @empty, 0x0}, &(0x7f0000000080)=0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x1, [], r0}, 0x48) 10:32:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000240)=[@timestamp], 0x1324c6) clone(0x82902001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x32, 0x0, 0x12) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1000000003c) fcntl$setstatus(r1, 0x4, 0x42803) 10:32:54 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='htcp\x00', 0x5) timer_create(0x7, &(0x7f0000000140)={0x0, 0x3e, 0x2}, &(0x7f00000001c0)=0x0) timer_delete(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r3, 0x4) socket$bt_bnep(0x1f, 0x3, 0x4) 10:32:54 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000001c0)=r1, 0x4) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x278000, 0x0) sendmsg$tipc(r2, &(0x7f0000000480)={&(0x7f0000000200)=@id={0x1e, 0x3, 0x1, {0x4e21}}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000240)="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", 0xfd}, {&(0x7f0000000340)="02e41d50978b2eb790d04905866bdbf9dc36a2e0a8b456deff77170fdff5adae18960e2a6add86ace9a0cdc6e08db436a2b4f25a39ba841a546294f5947dbe212324e2cdfcef403081e52d1a", 0x4c}], 0x2, &(0x7f0000000400)="1aa5864e0c272e70d7274e4cb5577cbc28ccd4aba5255c4a6423816d9c83ca7bf9714becba152e8b7a467e70a90ee7019f1b1b6478f572b0f872d4fcac127a1c85e8c4b726869cf93656d0093d02c17cbf150178588a12aeeb91d09cbe988f8f83ab0bc8f1976997c23a2593089da24802f07e4e207d08acda8f13994edce9", 0x7f, 0x20000000}, 0x20000000) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000004080000009500000000000000"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:54 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000004080000009500000000000000"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:54 executing program 3: r0 = socket$kcm(0x10, 0x5, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x101040, 0x0) [ 347.554603] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:54 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 10:32:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:54 executing program 0: r0 = socket$kcm(0x10, 0x400000, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:54 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) write$P9_RWSTAT(r0, &(0x7f0000000040)={0x7, 0x7f, 0x2}, 0x7) 10:32:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000004080000009500000000000000"], 0x0, 0x5}, 0x48) 10:32:55 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) syz_execute_func(&(0x7f0000000080)="7500d9f766660f6ce2c4e355462900340bc482253bb30d000000440fae8b0a000000f6d736400fdfe3c4a2e9939c1934000000") 10:32:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:55 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmmsg(r0, &(0x7f0000002900)=[{{&(0x7f00000001c0)=@x25={0x9, @remote={[], 0x0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)="1e593dbcd2da103ea5d94c9ce033424be8a6d2264ec00c4f5b20171d9d5baced5b6ca02f70d71ff10e9a3fce075f024ff0a0d4ddee1b017a9595be183254757501ae61cc53a491f20bf43d41c63c5efb58f3184c27f8ded4a59ca43eb6bca51a35a95a0dbd710e85cbe3b961f7c890efbc4c8ddffbbd5299141965ba173bf86bd567", 0x82}, {&(0x7f0000000300)="618cc218c81f2e62", 0x8}, {&(0x7f0000000340)="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", 0xfa}, {&(0x7f0000000440)="de1c86200b0999b0629b4746321c81c2586dd1b913d227ec661c28a5e46a20d8fad913290df899feca4984122ccd9646ef32072374ce55c345883f087a87823ced21180b39b45ee140ca42b2730341f7d3ba3e16b009425cf1424ad9040cedeb2e76da5cbf2fd29154e75f5bfd8473d82f5e09319808f75afd14bf8ff6e1d9227da9d54eb6161e02", 0x88}, {&(0x7f0000000500)="97cb63d0252d665f1de49237dd40a49e20acc953a480187a38a2622722abeadf62c04473aeb54c9987763a4267a2d2e45851706f0055ebb4dc1ed70bc5dcdb5c7d01c57a0bf75e66de0e34b40df91d22ab63a99abff1fa177d84ca44bd76c6eb8a1a7ac9cf35a99f7d965ff768cf8f285e1b77ea907b5697277047533eef9fbec6deda3659fd541d3581d85d3d4155a63c8474e3bd2153c6c5d160f91fca3ac1c4492321dc7e140ebc841bb50b0c501567cb8dc55ed7deee53b053c91315de9c596d349fbe3559f67ff0f7bdc06e02e20ad1a166194bceaded19baa1629556f73414afece8521805b85036ab10ee38a256caf426ef88d615afb987a2da73a844e2eeb1615db7be67903b4c6a2e2edc29b49244c6e0555d15c94525200132a7f8b19ac3fb1d6d62ba23226fffe8fb69ed2d7ec86a94b52468e26acfbfff9c1e1adaa0a3515b3e1412474f14685c590a0ffd12015fd9cd73f9f7266e25382e101d1270f491635c40af39bc92fb3aa5ef2e5a3b98a643e18cf5816ca1f7e336ea729e761d73aea650114ef903f1b491697909410f4e11a283259516b5c13cba146cb3f6102292ecf8066abbceca71af343c1ff0beacdd208f093e4314cb5324d02dbe4bfc07cc055e7b58b7d441ef3b46fe5d5c73bd7ddabb79028989a71f5bb64815275364be871d87c1c041a6077ebdfcdc9e3487e6c1664212b1ea34765a724acf23603b15218ffa8a7d0e4ae762b3b0be6971ed4e7ecfcaa1459a2eaaf9718f9db8d33b9a9b9473c5d3888212447d80fcbd87af299347bf7952f50154cf5bc5ebb1f1a099f2bf5601ea6229bc135bad11bb79c5ce041362c95e6e17c09e85a1db61e2268c3f2c90dd895d4c66dccd30c9dcc499117bd678529ce3b4a7248451ef9fae475b907a136bbcaf0899b51b43c30ee61ec99a5a2c2f2604c8cd8fede77bcebb1b466f086234cacbc2ba59ddc0cf5d90cf138d04768a35ff8b41389bbe5799ba8ee187bf0c9f9d3a7c9ae34d2e4936358c82239d85eca00a13308ffa0ddc3792cdbbd2f8f0fbdae6c7e97402f2cd890b1185114de35922ba617042408246ffbf1005fbd023c62e67f641c76fda165de8bf12f410e3abdd472260c5fe0c1ef3092f22a7754fbb98035a9cacdb7b613e1eed876849828d7f75ea17683bb194aca9700242980010b0fe05ef8d72b18fe0d8e12970086e0f888d3c9d65583d9cc31cd77d8d6ca49d16c89c459dc83a341f28c37be955f6d603aa5f7f0dd57ecb8dd7e1067435fa9bc19bcbaf1112b1d0b70943fc80f85d7d3b7baea5b8d0f5e3675f425cddada27c448e6122d89febf97c2d94e8b969ff88a2ef03f1ca77f030c3eef42c533c3e321d3139303166f5faef40fd6f6e7c417941941eb38556eba566a9e433d334eb7fef91bfa49a09034eec86a36f3ef78e07b09b2382fde0b5e8deac9dfe7e17b89f27ec2c10a57e5f7304ac9d3194050e66dbf9bb1b12f42d251364b5c5706f689a7f1f375da6c45c6992b18709de2077d9454022b652f5f1a3b4a2dd75a5f00a42cf267c69d5651750c83390326884abb1fbe5746062d842d4f01bee03b86a92eb1ed2749e511517a70db06b554d570dea37447295b72d65f2085bc25f105d1bc95e85bca3fc8ed23c533c00754d34af4d91c2f09b0bd6fd63c258a335bcd6fa47df6438c20065e2b05c2c2e46703f7600ea5b4e00a87a7a4ddca2bad4154a4789e6ee56e0befa40ccf45cff6f02cc8eda16d1d95eb5835695a9379b8dea81e8fd284a2dd3cec819f98b84727f8eff641184b85f4f928184d20a07cd1378a12c58d273557c60beb01379adbf2b02f4a2ee9fb32e64ac63d6f82d928e24f1a1a5aca058939e68403d645b9fe6d862f65b08a59350c658b3a194fb5f6c5901cf1b51c00c2997b845c37baec528efc2884a2cfd3096bea958ab1710d9398c028b4bd919f1273bcf3cee9fbdaf2ee2139c15703340323a9d5d330bb13cd312ca9d13a5ed92e11f71328ea410f5e22ba892eb9b3e499d25dfae237ee6c33e430e4d44604b96b27d0ebc66dd3ba482133d2ae682d41b029d1b3e02a5cd34aabbb314dd8dc887a1ecc8e2ae9a75a01ea32a0c204a33456d63b53dc5cda4d66374a5fd675076e181ea7067530d9fec341c8647ff2379d7efe6a4c3ab8159cde0502c307ca99fe5da37ee7e7b01009ff0867c782ace48d66420f450ee74016dd913674127c020d9e35fcba15ec5392a02fca1321ae740be0b18f453e5a40e40d3b90c4d764b9a6437ebd05b028d1a9fcfab518fd6cbede38f27786e2da1274cc4a7077b27721929413b3d08cbafc4ad0bce9211f126d3d40c3930fd62010372749e527b36958f6a9ed9fefac7c5bc3846b233427658e61048341463d64347ed6a881cb2d5bac1bbb2738af7feebb276f5a6c7baff3f45c0f61455509156f929a73b7ed016045549ba53b332e50f56388af713c1fe15d13b1d58192ed5b6f538ff2f0045d57ed0efe96af1887a190aa54bb0a8554af813667d8cc16dca16664221f0f2808fdf88b19aef4b867408ad87145090a3316604eee583b169cb58a4ba7406d1c30110bd9eb6231a341de3d101dcdce0f61c3d91f93799e2213707fcd5b8ed7e892f43316e92dae00e4d712880bf61b9715ffb03f9b3ca6d552e0c95e8b2474c7de8a93f4360efe62881a74ee777c69ba969c625478eed9f1301f84252d2fc6f37bd927f667374796e61bea1ea4bd795ae84dc28e031f68c9f8ec225299247814f94366510a70079d7de84096fdd2d1067dfd2ea587a5bcb350e0fc5eb03f731139318316cfcc65043f04f06270cbad794404945888358b1e73d964c2a4b54942667eca8b35b8e8ba8d2e6acd863a8c1ebe014c76d14c918150660dc48e859feedb5968fc5e38b49284b05bae8565f1ad80364fb8a4fb52e4e2c423c5843c8656e30faeda6dbae65600340f9c35e9e12f10e35562b016c61e002c2b9347682da4747921f13e4a700362fd6f330f13e357daca81a2054369d8c8fa63f09d1ec92351affe1de31a249e8562eab866f2fc0774c307fa3635440d49c831428fbdf08c36a899f08a7598ffdd93a23444e732e891efe508a7f67c85f126ffe74a457240cf91e4160cb01528f2da962f5d4e3d7571b8119f438206fa77906d1cd17e4a838d9f8fc2b93b86396e5d3bcd0b99509233a66ed3da52dc3b345f3c27bc65e360d29d0b4e461815278adfacf92dc7f970b7e4dfcf0e86ff162eb19d41760805b97a6a2cf7ae09fc01701b8d7d1eeb013fe2dfa5786da39dcdb7e442f6123d52f30dd58adb5de02e8135d837bc64f5689648302360afff4dc3b16f878f8f25fe4e870de244095f3f4dbf90c6704e51ed724405af99ca0a614ca4d96191420e4bfc45c345ab510a0bd12943d2e545a618fc39c1fedc761e20b1441fbe9208d40f3c18709ce35c77e895eb76e84f105dbd52400fb83d6a18a7bc604d60fdc32ccfc5dcc506de364607615d13af0bdd65dc98407fc18f42b3856809bc291153d2160bf005ac47ae41e49f14ec7ed4994b38e12fffe408a1833cc658f28258fcd29cdc7b5b9cd60b11f9b2571e7de0d525b0cbaea52b0e5daee21e13bd22361da5dce2b41e45da4f16247d0e7f589b14471e73a6a90fa4ad5abd5cf26c6a4dac920c3a7175e67534d2b7dcc2a856b3b1cfb696f7a23e0310e8fe926aaa9adc61be47cf0502bb691998b9dae21c3d1dca1b44bc5fc384c3909ae08fa3bd655505ee40c8cbbd020dd28e9ce5fd0077f6f743bbdc22957bfa96a3eeeea55d095711cbfcfc0be8ac6c875c7420f553abe47be9f3201f6de34d0a1285f8b2070a2fa74df231cb61f0e677da2c1aa9cf807011a674aa906e771c11a02ec06bb1044c1aa6893e383e8da49977421adaf47490044fd98acf07ffe28ce25f2e67463f0e8289c76f89c9e07e8e4a731a59fb36d7402fbb2ebc506434dc87a7ead946f5b8265776806d92bb27ce62d7d4e8b9ec8f845b2b5e9ac5bd895c46009c1d6b8c2a095eda9c03266bb8e023942baa2e3975e70d343fe0e059b0c8010dec2c0ec003199520893402e0742b2610897207a3c8a45b2effb3d4d1c9e018bed88c8f5da315dfc4bf167ccb22dd9c9c609b312a8440072e239871257fa1604c54da3ff69a244a36c9b1ad70d9dab53524c6dd097e5c7a62353c3f494c5bd52025908ce33b1a7a387a2e01b1ecac496035998877587194b046477b0bcae0e926c0e41b60d28e5da2ca7de609c8262d8158143ea659e22392c2f0270af3c2ca38863a89867d64138be20b6beb5c5a65783aa54f954f5c4fec076f31f75a9735f6d367caf8f9f41ff597f3c32e9a8ad3e8f50e8842d31df2efb6f02f220ddb53dad19111cb3051aa672b54471d5bdb30e525888c40156532300a8bf73f1d4c1ce9ed2e2c77365873d9af9b7dc654d2c1b3550a99efa538da60df3e5f113e230d443446a44dc16e714dd31e09af10d00495bd47e51a61ea24436b681611687d9ae98ecd058ed7264c41afa98ee66a42593d0efd20f3b859eae13e6befb081c2d9579fdf61b97b2c94496747f79852e515b00231cd9aad466f26884db2d552878cd913f2fedd7d46b26d8bf34978de498dcf23d16c0268163a29c56ff9d0907c051c26a52d95b825df2faeab9c83924036fb2dd9d67e026767339b5ffea8f57ee05e3a31bf6f4c8d4e71b76960287f34b340a0a2e84b0aa078ba95f66adf403ab9a444b612c46d79973117e57dd3cb751d7ea5c605a1df802b35362354299a4e2a6f4c6bb79ad2af2c91b9c47c65bd57bf3743e854f3c76603a295ffffb292dc7aac9cabf05205fcaf5ace61e976dfa0fae22cee2323d21c99dfd8a8db830b66e0a0a328d40f13b0c4c05691c3def18c11c683bd068b65d45a8c229ff34fbe6b5045690dcd341d5d8a6415314c53ebb7d352d9a7732a5dc64b940d3c29b1787b93ee4c919f60a07d0b1e3cf508d5a2ef13ed74452d831d7474e5f60d28c92a4e85d2a953d80636b24cf3db72d0c3ab55a139d303be9be22288145bdde4e8ef77706c9baabd01987cafe151ad11db553edf25f7c2a917e0d14d84b922752b19586b8434bc03bac9684333387c0022f56dbc01c8835c6ca6911c6a314ef071a695bda3a93f5c8315e30c1d40920eb0740fc655048c0106e7128b3400ebcbd6fce34e929f0ee15ef7d76bab96592e8a3d76c57fbb14fed36008dc565afd93f752337bcc734ea963758c83b5341fb6276e3c4c06293f68f97455e0cf5c4dc0d11b1e65fee4b0244cd3e9bdfa1790664812702eb54002fd626ce7be59a274428a76e8fc07a97df54498df142eb206eb3a918d01513621abf15ad4c07676531661534dc8a2ba89d3f4a969c6248f74f3831b837b94dfda47805011938b6fcb23528674bd411944cd29b8867bef6c437647ddf52782ae69356a57f793282f14726462d207e318e690265e933ed98802ab436497278f55a0be6bc103921893225c90af0a89e2b6e619048285b0cb05cdd292c1dd80db8d7fad6efa7d16a76d3f4af42f645df096b3fb4d94358432ad61143b1bb033ef357749ebff6091f191f1386ec4f72b1a25cde95c5d0739f44bc8d15f7c7fa2219288f088f390b1b9d888495075889b9871e0ca4b98a0e79a93c8b38e38da45a9e739b3fba2e78c43fa1742f9249d2ccb514054f36f1c428cbb9bfb223b61db28e5cc91d76122aeecc78d99e6a1722da47a0a20cfb21fa517084a2207fd65045c5fc10549d903f5e8c472b4a1fe6bd8e492ad0", 0x1000}], 0x5, &(0x7f0000001580)=[{0x1010, 0x12f, 0x3, "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"}, {0x18, 0x101, 0xfffffffffffffffa, "74e68b48c72b"}, {0x28, 0x11d, 0x2, "d51c0d859c0f196ffb0fd155cc5109b598"}, {0xe8, 0x113, 0x10001, "8be1d7d3ad55d488befc6c11b182dfd596527f329f142d199f5db1a2079e893089dbf823e65d287f4e28c3e5b7d3db3ba2ea138a29698eef122d63084e5e5ccb9efca29279575c72166c6b0e3782d7a5442424951b196ca145f6d1a288c0bdfe9ffb604b7f551fb3f3476f847b4306bdbdf29ec077ee597d9f53c25b66d608200f41fbefbc380125cad7e5dd83e5206fb12d47bec56f82b7c57bf24a5f69acbf998a5a9091e201eb6ded83f400f4a96795e4163493722d5e9d678b1d3215265d0c4c3fab8babfd9e05ad4f1a46f629d7f3ed446c"}, {0x40, 0x6, 0x100000000, "6d3eba0c7aecaf62504ca4100891fdc6b166247d0d78917b41602597d381fbaf34eb73da47618b6c09dfb37ff0e8"}, {0x50, 0x1bf, 0x8, "900c4e19331546e27a5636356801546766deeb1e116eb3432e6a1c646756dcd85d3f0a971159c1359a5741b4d73c33c5d05a2951917c56a766079f961399"}, {0xb0, 0x109, 0x7ff, "3835604229c428d0de5545f963aa8fc568e3211a2790fb17ff32dd1389c1da2280c75012fcd803e97c8fee88d99e529cc64fd513a2f684a4f268b0215f54bb9f0b500cead815adb29c520c2a99ce953c672c5a81bb2eed663a2ba0905b9451d689f9b9f57be055089de84fdaf21388242d108cde6987a227c2faa0d7211e1c459d794209f867fde16bc73dcff06ec9d14daea34b8bf790cdce4954fc1ce7cbe1"}, {0xe8, 0x0, 0x4, "19a236a06ccda271dcf988400c54ce0f2bf2106c56db61b7ef5f0811cdf112f12d558d1aa18eaaa5b292447aecadf4ed200b2fe68bc1c9ca7a36d46266ae2e2a90144da967e5e11f5881fd8f8696995c3c00243fd22a3025030ba7c51cfab27b5f34e6827057fb4096e70249c84d595aba4d68dfc0d20f1391a707d2fa6c37bae946683df250c935ae2b58615a35ce877831810230fbc4b233bbe34a25cd29e9178d463c78c05ce40122af7298d2ac5197b258a9efed492fae9bdffdff35ab242cca61084aedcf76ddbc145c52e97617dee4"}], 0x1360}, 0x3}], 0x1, 0x840) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x400000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x0, 0x4) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000080)={0x2, [0x0, 0x0]}) 10:32:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000004080000009500000000000000"], 0x0, 0x5}, 0x48) 10:32:55 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) write(r0, &(0x7f00000001c0)="e9f47ee97f2901cfdd60f0c59174e021ec60f01cd4322f1b905058e1e9a1352baac3017f3e97590bca892a6f9533f0afda7b6f8b6e04b09c59e5c236d09762502d9ea8feb1d33965bc0f279f30fccbb8986416618988d853392cdcb6bd505a58f8520866d3b2949d29b65c8ed7e24082f3ddeeed0e838872f29399477a8919cb41895b31710e75b9f1a08b5a59a13d9afc4a9c8ec11e6f7970193aa1c557ef8514a3839a13b1a51495625f299e05c408edcb1b736a53277229a576bda1ff6ece0673278730723c8225", 0xc9) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x801, 0x0) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f00000002c0)={0x7, 0x3}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x111901, 0x0) [ 348.421824] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 348.559438] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:55 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) 10:32:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000004080000009500000000000000"], 0x0, 0x5}, 0x48) 10:32:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x41100, 0x0, [], 0x0, 0x1}, 0x48) socketpair(0x2, 0x4000000000006, 0x10001, &(0x7f0000000240)={0xffffffffffffffff}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000140)={@loopback, @loopback, 0x0}, &(0x7f00000001c0)=0xc) sendto$packet(r0, &(0x7f0000000100)="43b0fd3f26cf0dbf62e50e4ad06aa3fbb4c615fc73663f444c756f3a07fa3597605ed9a98c92305474ef89e05389b284aed150ab474715786ff10e4fdf482c", 0x3f, 0x20000000, &(0x7f0000000200)={0x11, 0xff, r1, 0x1, 0xff, 0x6, @local}, 0x14) 10:32:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:55 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="7c5f60898f9c91a1d40a196b8c692214bd7bf5d3eb187a4eda98c21f594ec14b6a6ca81e2b13cf36352bc1fc705f8f39ec02e51d98fafa96fb5e50ac39cf7ac903dff74ac29bd578b25e5a129d18a77806032af01109565e15e2199e6b5caf34d4eec0d2d772e5e686344d14932aa505ab78e3b4b35fec03ac06019492492d65ea2e2c4479cbbb1c23ef3d2c78f8fee3ab58ab4251faa029738da80be985678c262b8ff8d9"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:55 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x14, &(0x7f0000000140)={@mcast2, 0x0}, &(0x7f0000000340)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x9, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x9d}, [@call={0x85, 0x0, 0x0, 0x29}, @call={0x85, 0x0, 0x0, 0x13}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x7fff}, @call={0x85, 0x0, 0x0, 0xd}, @jmp={0x5, 0x1, 0x3, 0x0, 0xf, 0xfffffffffffffff4, 0x9}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xdb, &(0x7f0000000240)=""/219, 0x40f00, 0x1, [], r1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) [ 348.974648] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:56 executing program 0: socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:56 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='net/snmp\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 10:32:56 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000000c0)={0xdd5a}, 0x4) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r3, 0x2081fc) r4 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) fcntl$setstatus(r4, 0x4, 0x40400) write$FUSE_WRITE(r4, &(0x7f0000000080)={0xf0}, 0xfffffda3) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) 10:32:56 executing program 2: 10:32:56 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x4d00, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000140)=0x6, 0x4) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f00000001c0)={0x20006, 0x7, 0xe9, 0x100, {0x77359400}, {0x4, 0x8, 0x3ff800000000, 0x5, 0x20, 0x7, '\bC\aB'}, 0xbfa, 0x2, @fd=0xffffffffffffff9c, 0xffffffffffffff78}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) [ 349.512166] hrtimer: interrupt took 273521 ns 10:32:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], 0x0, 0x5}, 0x48) 10:32:56 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sctp\x00') getdents(r0, &(0x7f0000000ea9)=""/407, 0x197) 10:32:56 executing program 0: r0 = socket$kcm(0x10, 0x800000000000, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000000000000000000002000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x80100, 0x0) connect$bt_rfcomm(r2, &(0x7f0000000200)={0x1f, {0xffff, 0x2, 0x8, 0x4ac3, 0x8, 0x8}, 0x2}, 0xa) clock_gettime(0x0, &(0x7f0000002440)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000002300)=[{{&(0x7f0000000300)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000380)=""/144, 0x90}, {&(0x7f0000000440)=""/120, 0x78}, {&(0x7f00000004c0)=""/141, 0x8d}, {&(0x7f0000000580)=""/62, 0x3e}], 0x4, &(0x7f0000000600)=""/141, 0x8d}, 0x4}, {{&(0x7f00000006c0)=@isdn, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000000740)}, {&(0x7f0000000780)=""/114, 0x72}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/145, 0x91}, {&(0x7f00000018c0)=""/252, 0xfc}, {&(0x7f00000019c0)=""/11, 0xb}, {&(0x7f0000001a00)=""/214, 0xd6}, {&(0x7f0000001b00)=""/186, 0xba}], 0x8, &(0x7f0000001c40)=""/58, 0x3a}, 0x1}, {{&(0x7f0000001c80)=@l2, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001d00)=""/66, 0x42}], 0x1, &(0x7f0000001dc0)=""/221, 0xdd}, 0x72}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001ec0)=""/196, 0xc4}], 0x1, &(0x7f0000002000)=""/5, 0x5}, 0x1f}, {{&(0x7f0000002040)=@pptp, 0x80, &(0x7f00000022c0)=[{&(0x7f00000020c0)=""/100, 0x64}, {&(0x7f0000002140)=""/131, 0x83}, {&(0x7f0000002200)=""/159, 0x9f}], 0x3}, 0x7}], 0x5, 0x20, &(0x7f0000002480)={r3, r4+10000000}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r5 = accept4$tipc(r1, &(0x7f0000000240)=@name, &(0x7f0000000280)=0x10, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) poll(&(0x7f00000002c0)=[{r5, 0x8600}, {r5, 0xb7d356786cfbb614}], 0x2, 0x1) 10:32:56 executing program 5: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x4008700e) 10:32:56 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'bridge_slave_0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14, 0x9d9fc46026529cf1) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1c, &(0x7f0000000340)={@initdev, 0x0}, &(0x7f0000000380)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000004040)=[{{&(0x7f00000003c0)=@isdn, 0x80, &(0x7f0000000580)=[{&(0x7f0000000440)=""/51, 0x33}, {&(0x7f0000000480)=""/77, 0x4d}, {&(0x7f0000000500)=""/83, 0x53}], 0x3, &(0x7f00000005c0)=""/223, 0xdf}, 0xffff}, {{&(0x7f00000006c0)=@ipx, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000740)=""/115, 0x73}, {&(0x7f00000007c0)=""/21, 0x15}, {&(0x7f0000000800)=""/23, 0x17}, {&(0x7f0000000840)=""/79, 0x4f}, {&(0x7f00000008c0)=""/111, 0x6f}, {&(0x7f0000000940)=""/106, 0x6a}], 0x6, &(0x7f0000000a40)}, 0x1}, {{&(0x7f0000000a80)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000000b00)=""/114, 0x72}, {&(0x7f0000000b80)=""/4096, 0x1000}, {&(0x7f0000001b80)=""/249, 0xf9}, {&(0x7f0000001c80)=""/191, 0xbf}, {&(0x7f0000001d40)=""/44, 0x2c}, {&(0x7f0000001d80)=""/7, 0x7}], 0x6}, 0xd63f}, {{&(0x7f0000001e40)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000002340)=[{&(0x7f0000001ec0)=""/138, 0x8a}, {&(0x7f0000001f80)=""/187, 0xbb}, {&(0x7f0000002040)=""/64, 0x40}, {&(0x7f0000002080)=""/239, 0xef}, {&(0x7f0000002180)=""/251, 0xfb}, {&(0x7f0000002280)=""/142, 0x8e}], 0x6, &(0x7f00000023c0)=""/4096, 0x1000}, 0x40}, {{&(0x7f00000033c0)=@in={0x2, 0x0, @empty}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003440)=""/100, 0x64}, {&(0x7f00000034c0)=""/195, 0xc3}, {&(0x7f00000035c0)=""/217, 0xd9}, {&(0x7f00000036c0)=""/235, 0xeb}, {&(0x7f00000037c0)=""/195, 0xc3}, {&(0x7f00000038c0)=""/252, 0xfc}, {&(0x7f00000039c0)=""/183, 0xb7}, {&(0x7f0000003a80)=""/205, 0xcd}, {&(0x7f0000003b80)=""/202, 0xca}], 0x9, &(0x7f0000003d40)=""/23, 0x17}, 0x7fff}, {{&(0x7f0000003d80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003f40)=[{&(0x7f0000003e00)=""/174, 0xae}, {&(0x7f0000003ec0)=""/97, 0x61}], 0x2, &(0x7f0000003f80)=""/130, 0x82}, 0xfffffffffffffe01}], 0x6, 0x1, &(0x7f00000041c0)={0x77359400}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000042c0)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f00000043c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000004400)={'vcan0\x00', 0x0}) getsockname(0xffffffffffffff9c, &(0x7f0000005bc0)=@hci={0x1f, 0x0}, &(0x7f0000005c40)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000b2c0)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, &(0x7f000000b3c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b440)={{{@in=@multicast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@empty}}, &(0x7f000000b540)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x14, &(0x7f000000b580)={@mcast1, 0x0}, &(0x7f000000b5c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f000000b9c0)={&(0x7f0000000080), 0xc, &(0x7f000000b980)={&(0x7f000000b600)={0x36c, r1, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x10c, 0x2, [{0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x2, 0x647c, 0xfffffffffffffc00, 0x1}, {0x8, 0x3, 0x7, 0x8}, {0x20, 0x8, 0xffffffffe0f7002b, 0xd32f}, {0x4f04, 0x9, 0x86, 0x7}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2bb54c83}}, {0x8, 0x6, r3}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0x4, 0x20, 0x0, 0x7fffffff}, {0x7fff, 0x994, 0x6, 0x400}, {0x3, 0x400, 0x26e, 0x3}, {0x800, 0x9, 0xffffffffffff8000, 0xcd0}, {0x1, 0xb6b3, 0x7, 0x8}, {0x1, 0x3f, 0x4, 0x8}, {0x1, 0x80000001, 0xffffffffffffffc0, 0x7}, {0x11, 0x0, 0x0, 0x3}]}}}]}}, {{0x8, 0x1, r4}, {0x174, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x20}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x172}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1000}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x20}}}]}}, {{0x8, 0x1, r9}, {0x74, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r11}, {0x44, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r12}}}]}}]}, 0x36c}, 0x1, 0x0, 0x0, 0x800}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:32:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], 0x0, 0x5}, 0x48) 10:32:56 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000000), &(0x7f00000000c0)=0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$cgroup_int(r0, &(0x7f0000000080)=0xffffffffffffffe, 0x173) r2 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x21) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) fchdir(r3) setpriority(0x2, 0x0, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x0, 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) 10:32:56 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:32:57 executing program 5: r0 = socket$kcm(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000400)={&(0x7f00000000c0)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) 10:32:57 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000380)=ANY=[@ANYBLOB="85000000080000000000000000000000e40a07ee634b060bb1dd7ce14d25b9e1466e576451919876f75f9c739f5ee4428337e768c171b6f35c485bdcfd9829d707550b965633e97e64f5cd2a4eb41b9ec2458e879c54844c7f003cb75c283c654a6c269d77ee9a08da23018ff08864012fea52502b4de117aac96ba3ba7a75f221a71bcc5cb1e4"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r2 = socket$isdn(0x22, 0x3, 0x7) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) modify_ldt$write2(0x11, &(0x7f00000001c0)={0x3, 0x0, 0x0, 0x9, 0x80000001, 0x5, 0x3, 0x9, 0xd77, 0x7}, 0x10) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000002c0)={0x9, 0x8001, 0x5, 0x3}, 0x14) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$SG_GET_VERSION_NUM(r3, 0x2282, &(0x7f0000000240)) write$P9_RMKNOD(r3, &(0x7f0000000300)={0x14, 0x13, 0x2, {0x4, 0x1, 0x8}}, 0x14) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000280)=0x86) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000002700)=ANY=[@ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000200000000000000f500000000000000", @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000d00000000000000010000000000000", @ANYPTR=&(0x7f00000005c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000004000000000000000100000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="000000000000000001100000000000007500000000000000", @ANYPTR=&(0x7f00000015c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000000000000000000a700000000000000", @ANYPTR=&(0x7f0000001640)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000000000000000000010000000000000", @ANYPTR=&(0x7f0000001700)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="850000001a000000950000000000000012d64559baaa58a02efe3b57e38dc7f194cda032c027887382a750fa30cbf9d8412581532a9c4a710b50e14caa54ae94c2fb9dc14a0ca048ea7238d870b5c8109c3a5cc3786605c9c7f56b339e82e182b7980ac7763c7e51907e875baac34eaed62f46fc938b5799c951bf3eeeec2d99de061a64255c298dd5e5"], 0x0, 0x5}, 0x48) 10:32:57 executing program 4: [ 350.282470] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:57 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r0 = semget(0x0, 0x1, 0xb7) semctl$SETVAL(r0, 0x3, 0x10, &(0x7f0000000080)=0x5) 10:32:57 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7003) 10:32:57 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f00000006c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000000200)={0x46c, r2, 0x220, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0xf0, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400000008000}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MEDIA={0x6c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffff2818}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffff800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5c2}]}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}]}, @TIPC_NLA_LINK={0x88, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xe792}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK={0x10c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x21e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0x90, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'syz_tun\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x0, @empty}}, {0x14, 0x2, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}]}, @TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0xc}, 0x3}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x3800000, @mcast2, 0x17}}}}]}, @TIPC_NLA_MEDIA={0x4}]}, 0x46c}, 0x1, 0x0, 0x0, 0x4040000}, 0x20000000) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r3, 0x4) 10:32:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x200000, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4000, 0xc) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000200)={r3, 0x0, 0xffffffffffff7fff, r4}) add_key(0xffffffffffffffff, 0x0, &(0x7f0000000180)="70b179891ddd88b4c00ea679d131ca9918ad5062ded382cb7f7bd95407acc58968d4fe7a41710fbca761cf8289278ccc9645", 0x32, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000380)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, &(0x7f0000000240)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40246608, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:32:57 executing program 5: r0 = creat(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000100), 0x1c) r3 = dup2(r2, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000180)=[@window={0x3, 0x0, 0x7f}, @sack_perm], 0x20000000000000d0) ioctl$KDGETKEYCODE(r1, 0x4b4c, 0x0) 10:32:57 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 350.652410] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 10:32:57 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7003) 10:32:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r1 = dup(r0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000040)={0x2b, 0x3, 0x0, {0x6, 0xa, 0x0, 'syzkaller\x00'}}, 0x2b) [ 350.844427] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. [ 350.969211] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:58 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x200000, 0x85) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f00000003c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x4e20, 0x6, 0x4e20, 0x0, 0x2, 0x20, 0x20, 0x3b, r3, r4}, {0x1, 0x10000, 0x245, 0x10001, 0x279, 0xdf, 0x7, 0x3}, {0x3, 0x0, 0x6, 0xee}, 0x101, 0x6e6bb1, 0x0, 0x0, 0x1, 0x3}, {{@in6=@loopback, 0x4d3, 0x33}, 0x2, @in=@rand_addr=0xffffffff, 0x3502, 0x3, 0x3, 0x0, 0x2, 0x3f800000000, 0x400}}, 0xe8) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r2) sendto$rxrpc(r2, &(0x7f0000000500)="8567b63eb579102d16b018ce86e3bdda9b40827337e0f505798eb33b12046d5f073f3571f188e27c02463827fd2956dae1e9b9f0e18fd06fa1b108c2372a61a77b2e022ab2bbeed440acc2a3705389d32a2bf7e0c6a6c857fb908de489edd6258d9fab0b7c04936aa1fda7203e369d63dd4d476fae0ef677662dff40284b5412cc3e0215964178e25ba235b2cd67111f18d4fe68aaa6e19b7c5c32af257e709993fd3d64c817", 0xa6, 0x4080, &(0x7f00000005c0)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e22, @loopback}}, 0x24) 10:32:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x200000, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4000, 0xc) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000200)={r3, 0x0, 0xffffffffffff7fff, r4}) add_key(0xffffffffffffffff, 0x0, &(0x7f0000000180)="70b179891ddd88b4c00ea679d131ca9918ad5062ded382cb7f7bd95407acc58968d4fe7a41710fbca761cf8289278ccc9645", 0x32, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000380)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, &(0x7f0000000240)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40246608, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:32:58 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7003) 10:32:58 executing program 0: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x7) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f00000001c0)=""/100) r1 = socket$kcm(0x10, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180)=r0, 0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000040), &(0x7f00000000c0)=0x4) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:58 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) pwrite64(r1, &(0x7f0000000080)="a7", 0x1, 0x0) 10:32:58 executing program 2: socket$inet(0x2, 0x4000000001, 0x100) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x100000}) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x100, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000680)=@assoc_value={0x0, 0x3}, &(0x7f00000006c0)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000700)={0x8000, 0x4, 0x1, 0x4, r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000088000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={0x0, @in={{0x2, 0x20, @broadcast}}}, &(0x7f0000000440)=0x84) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYRES32=r2, @ANYBLOB="78ecd41b20284c8153fab097aeb83b1f000100000000"], &(0x7f00000004c0)=0xc) ioctl$KVM_TRANSLATE(r0, 0xc018ae85, &(0x7f0000000640)={0xf000, 0x2, 0x80000001, 0x0, 0xebb}) getsockopt$inet6_dccp_buf(r0, 0x21, 0x0, &(0x7f00000001c0)=""/254, &(0x7f00000002c0)=0xfe) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000540)={{{@in=@broadcast, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000480)=0xe8) [ 351.389998] *** Guest State *** [ 351.393525] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 351.402647] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 351.411657] CR3 = 0x0000000000000000 [ 351.415435] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 351.421445] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 351.427617] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 351.434446] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 351.442595] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 351.450637] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 351.458734] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 351.466848] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 351.475080] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 10:32:58 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="85000000080000009500000000000000b4617ea0674f4201ff2c4b09868cfdc0a481a7fc060b8f13fd49afb94b28c843e8eaffc4e2d44ee675c588fadb14970ac4bcae5db2b92483fe270f092aba5fabcd19cb3054b59005934523e97d6c7bed681e09c8696e6f885c46b182124c0956eb0199f400c016700dc2"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) prctl$PR_SET_TSC(0x1a, 0x1) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 351.483187] GDTR: limit=0x00000000, base=0x0000000000000000 [ 351.491210] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 351.499301] IDTR: limit=0x00000000, base=0x0000000000000000 [ 351.507445] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 351.515533] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 351.522103] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 351.529869] Interruptibility = 00000000 ActivityState = 00000000 [ 351.536277] *** Host State *** 10:32:58 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7003) [ 351.539513] RIP = 0xffffffff812ff9c0 RSP = 0xffff8880296ef340 [ 351.546688] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 351.553228] FSBase=00007fbcd8086700 GSBase=ffff88812fc00000 TRBase=fffffe0000003000 [ 351.561129] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 351.567145] CR0=0000000080050033 CR3=000000008aa54000 CR4=00000000001426f0 [ 351.574314] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff8ae015f0 [ 351.581026] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 351.587213] *** Control State *** [ 351.590717] PinBased=0000003f CPUBased=b5a06dfa SecondaryExec=000000c2 [ 351.597508] EntryControls=0000d1ff ExitControls=002fefff [ 351.603100] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 351.610065] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 351.616928] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 351.623654] reason=80000021 qualification=0000000000000000 [ 351.630009] IDTVectoring: info=00000000 errcode=00000000 [ 351.635597] TSC Offset = 0xffffff406dc48230 10:32:58 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x8, 0x202800) ioctl$VIDIOC_G_FBUF(r2, 0x8030560a, &(0x7f0000000280)={0x1, 0x2, &(0x7f0000000140)="9962d8af01fbeaf83789a7cbf041184ea0c5f914f16b6ab4cb8ee40ca2bbd283a4d40bbb2e715a6c076e185f", {0x0, 0x8, 0x31303453, 0x0, 0x9d6, 0x1f, 0x0, 0x3}}) write$UHID_SET_REPORT_REPLY(r2, &(0x7f00000001c0)={0xe, 0x0, 0xc625, 0x1ff, 0x89, "6819bd78117ffd70e148b581e0a5d253b85bd6f3593a3c018381f617ff4f914ee5650ecd3c93a8591844395980b529928eabe2cf88bb8cbff4ed207c1eddcb20732fe66b5960fa19accaac3361bc8e9c49404467122ef4c7e23d6ff18cbcd167e1279262eda36f9f93e0c456deaa7d7542d635fce8c9f3888858b09fb04124b3c175b9b3ad363ae727"}, 0x95) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) [ 351.640127] TPR Threshold = 0x00 [ 351.643643] EPT pointer = 0x000000002a06801e 10:32:58 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r1, 0x80247009, &(0x7f0000000080)) [ 351.827916] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. [ 351.897772] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:59 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x40c00, 0x0) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f00000001c0)={0x1, 0x0, 0x2080, {0x7006, 0xf001}, [], "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", "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"}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000040)={0x5, 0xffffffff, 0x6}) 10:32:59 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.nlink\x00', &(0x7f00000001c0)=""/243, 0xf3) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)=0x0) r4 = getgid() mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x12008, &(0x7f0000000440)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x6}}, {@max_read={'max_read', 0x3d, 0xe62c148}}, {@max_read={'max_read', 0x3d, 0x7}}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.nlink\x00'}}]}}) 10:32:59 executing program 1: 10:32:59 executing program 4: ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7003) 10:32:59 executing program 5: 10:32:59 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x80402, 0x0) 10:32:59 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r2, 0xc0305616, &(0x7f0000000200)={0x0, {0xfffffffffffffff7, 0x3}}) 10:32:59 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x42, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000380)={0x7, 0x3ff, 0x1, 0x400}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x1ffffffffffffce3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x9, 0x1, 0x0, r2}, @call={0x85, 0x0, 0x0, 0x5d}, @exit, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x9}, @exit, @jmp={0x5, 0x6, 0x7, 0x3, 0xa, 0x40, 0xffffffffffffffff}, @alu={0x7, 0x3, 0x0, 0xf, 0x7, 0x20, 0xfffffffffffffffc}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x41100}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r3, 0x100000015) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000001c0)=""/25, &(0x7f0000000200)=0x19) getsockopt$inet6_buf(r2, 0x29, 0x32, &(0x7f00000000c0)=""/135, &(0x7f0000000000)=0x87) 10:32:59 executing program 4: ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7003) [ 352.492979] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:59 executing program 5: [ 352.564939] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:32:59 executing program 1: 10:32:59 executing program 4: ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7003) 10:32:59 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f0000000140)=0x6, 0x4) 10:32:59 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f00000001c0)=""/195}, 0x48) 10:32:59 executing program 1: 10:32:59 executing program 5: 10:32:59 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r2 = socket$netlink(0x10, 0x3, 0x7) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x4) prctl$PR_SET_UNALIGN(0x6, 0x3) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:32:59 executing program 4: r0 = syz_open_dev$rtc(0x0, 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7003) 10:33:00 executing program 1: [ 353.111871] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:33:00 executing program 2: accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14, 0x800) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000240)=""/192, 0xc0}, {&(0x7f0000000300)=""/4096, 0x1000}], 0x2, &(0x7f0000001300)=""/184, 0xb8}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x20000000000001f3, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x3ff, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x2000000, [], r0}, 0x48) r1 = syz_open_dev$usbmon(&(0x7f0000001400)='/dev/usbmon#\x00', 0x82, 0x42) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000001480)) setsockopt$inet6_tcp_int(r1, 0x6, 0x11, &(0x7f0000001440)=0x7d, 0x4) 10:33:00 executing program 4: r0 = syz_open_dev$rtc(0x0, 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7003) 10:33:00 executing program 5: 10:33:00 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000080000000000000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) [ 353.222384] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:33:00 executing program 1: 10:33:00 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="850000000800000095000000000000003f336c279c89ed759713a9100fe53ce5dc24f68b079f59daf03607fdb0f97018f7c10ae8"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000300)=r1, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000340)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff00008000000000d9550c6a5e3b94e63c7eb4b975a50000000000000058c3c86e80a33051ed2d6c47604048116380dd5897d3b39d24c2cc5db294f03edc79329c3d9ab7665d14b677db94b1b4597fcd36d526316b0e5934cb4b1de7540446881da78bfd0ea1de0a86e242147cdd8d3c2c4469b04875a297a75e1393ce6df634d787b2db415ca0302371126caf179fd409906a69266dd0791bf2e647", 0x2e}], 0x100000bc}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x3e8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'team0\x00', r2}) 10:33:00 executing program 4: r0 = syz_open_dev$rtc(0x0, 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7003) 10:33:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="8500001808000000950000000000349f"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:33:00 executing program 5: 10:33:00 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="69269e2bed189f00"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:33:00 executing program 1: 10:33:00 executing program 4: syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7003) 10:33:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="20661668826b831e638ddcf74e42105500eeff000000006605a4ab6f9a936bd975776092f8def203c4cd6e8e4ef7c7d1ec8d"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:33:01 executing program 5: 10:33:01 executing program 1: 10:33:01 executing program 3: pipe(&(0x7f0000000000)) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000080)=ANY=[@ANYBLOB="856683449fe548bff64ece8376d896b60013e026e860def96efd17d5e50000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:33:01 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85001fcb3d1d00009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:33:01 executing program 4: syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7003) 10:33:01 executing program 5: 10:33:01 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x4, 0x480142) ioctl$TIOCGPTPEER(r0, 0x5441, 0xfffffffffffffff7) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000080)=ANY=[@ANYBLOB="85000000080000009517154700000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000000), 0x4) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) [ 354.317819] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:33:01 executing program 1: 10:33:01 executing program 3: r0 = socket$kcm(0x10, 0x5, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85800500080000009500070000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:33:01 executing program 4: syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7003) 10:33:01 executing program 0: r0 = socket$kcm(0x10, 0xfffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:33:01 executing program 5: 10:33:01 executing program 2: getpeername$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x20000000000001d6, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f00000006c0)='syzkaller\x00', 0x5, 0x36ea91c9, &(0x7f000000cf3d)=""/195, 0x0, 0x1, [], r0}, 0x48) 10:33:01 executing program 1: 10:33:01 executing program 4: 10:33:02 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x6, 0xde, 0xd23, 0x100, 0x0, 0x7f, 0x10, 0x1, 0x1, 0x5, 0xffffffffffffff80, 0x1f, 0x9, 0x2, 0x101, 0x0, 0x40, 0x0, 0x9, 0x100, 0x3, 0x3, 0xa9, 0x7, 0x80000001, 0x1, 0x3, 0x2a, 0x2e, 0x5, 0x9, 0x7fffffff, 0x2400000, 0x8, 0x7, 0x4, 0x0, 0x80000000, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x10, 0x1, 0x8, 0x8, 0x7, 0x2, 0x30}, 0xffffffffffffff9c, 0x4, 0xffffffffffffff9c, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000140)={0x0, r2, 0x7, 0xfffffffffffffffd, 0x401, 0x6}) 10:33:02 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000480)=[{{&(0x7f00000001c0)=@xdp, 0x80, &(0x7f0000000400)=[{&(0x7f0000000240)=""/143, 0x8f}, {&(0x7f0000000300)=""/115, 0x73}, {&(0x7f0000000380)=""/89, 0x59}], 0x3, &(0x7f0000000440)=""/31, 0x1f}, 0x2}], 0x1, 0x40000000, &(0x7f00000004c0)={0x77359400}) 10:33:02 executing program 4: r0 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbf) setresuid(0x0, r1, 0x0) setrlimit(0xe, &(0x7f0000000040)={0x0, 0x10000000803}) 10:33:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$key(0xf, 0x3, 0x2) dup3(r0, r1, 0x0) 10:33:02 executing program 1: 10:33:02 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x40001, 0x0) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000380)=0xfffffe7a) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000000c0)=ANY=[@ANYBLOB="0800000016000000a6ad5c3bedd204abd8c2e1dcc7064f9985620e4d0f03ad094df817234b29"]) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000300)={0x8000, 0x7, 0x7c, 0x101, 0xffff, 0x1}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000600)={&(0x7f0000000500), 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r3, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) fchown(0xffffffffffffffff, r1, r2) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x7f, 0x8, 0x7, 0xff, 0x1c09}, &(0x7f00000003c0)=0x14) r4 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x8001, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x2) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000440)=0x3, 0x4) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000780)={0x4c, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="003a40000000000000000c0000000000000000000000181800000000000038000000000000000000000000000000000000000000", @ANYPTR=&(0x7f0000000640)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r4, @ANYBLOB="000000000400000000000000"], @ANYPTR=&(0x7f0000000680)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00\x008\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00(\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0563044002000000"], 0x23, 0x0, &(0x7f0000000740)="6fe7a8e21491feabc5210b419acc484d31c8d35148a536bbdec6b821701b73b4fbcf20"}) [ 355.327003] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:33:02 executing program 1: 10:33:02 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0xa8000) ioctl$IMCLEAR_L2(r2, 0x80044946, &(0x7f0000000140)=0x4) 10:33:02 executing program 5: 10:33:02 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000080000ac90487d0000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:33:02 executing program 4: 10:33:02 executing program 1: r0 = add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, r0) 10:33:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="850000000800000095000000000000000f8ca674fb8b4b42a16c6c06948e4f16587bc7c1224e27591c57737bb7fa0db27ec8b51d099c44ca7fc16f700a9aac5f22475131aa7119ee1be561646d06f4981fc207a2edaf69f8b8da284b6af5fedc04ac6d515358e0b47904debf264b14908b7255a85099fb1111"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:33:02 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='comm\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/246, 0xfffffea3}], 0x1, 0x0) [ 355.808314] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:33:03 executing program 4: clock_adjtime(0x0, &(0x7f00000001c0)={0x27ff, 0x0, 0x0, 0x0, 0x0, 0x1}) 10:33:03 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0x2, 0x2) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40080, 0x0) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f00000002c0)) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000080)) r1 = socket$kcm(0x10, 0x7, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="85000000080000009500000056d77e512fa643c52dc26db64a489475a6a48d2e61c6d145bdc6e0ff3c19ccfd830945f6e1f636a6b6afc0d173ec98db7649b791a6919dedfcf0fa79a104cf70cbd193ed41177572ab88630a062f83a8bad45cf862b54fa3592fc46c7e7d7b3f26a690735121c6e125f7b28d30677f9ad3fc0c3b35a7e8c4fa7143235f72d08378db2504174e53fd8a1df690d94cb765c30cf0f8222ddb26db0236646e7a9acab9214655de281d50a9d565"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) socket$packet(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0x0, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xc}}}}, 0x88) 10:33:03 executing program 3: r0 = socket$kcm(0x10, 0x7fffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x4000, 0x0) getpeername$inet(r2, &(0x7f0000000140)={0x2, 0x0, @dev}, &(0x7f00000001c0)=0x10) 10:33:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000000000000000000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) 10:33:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffd76}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100030e000000030000000000000005000600000000000a0000400000000400000000000000000000002100004000000100000000000002000100010000fdff00000200fd000005000500000000000a004872bbb6896209000000000000009aec3f3f7710aa000000ff1700400000"], 0x70}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x40000000000006c, 0x0) 10:33:03 executing program 1: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000001c0)={0x27ff, 0x0, 0x0, 0x0, 0x0, 0x1}) 10:33:03 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x3ffe) 10:33:03 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x30b) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, r0, 0x0) 10:33:03 executing program 2: openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="858941c0392fccc6ebb3000000a6a1c1"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:33:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') lseek(r0, 0x0, 0x4) 10:33:03 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x2002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000048c357e1b607690a50f0e23600"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) [ 356.572409] protocol 88fb is buggy, dev hsr_slave_0 [ 356.578115] protocol 88fb is buggy, dev hsr_slave_1 10:33:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") statfs(0x0, 0x0) [ 356.732767] protocol 88fb is buggy, dev hsr_slave_0 [ 356.738519] protocol 88fb is buggy, dev hsr_slave_1 10:33:03 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000080000009d0000ff00000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) r2 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x800) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) 10:33:03 executing program 2: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000040)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000140)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000080)='sy\x11`\x9b\x1d\x11\xdc?j', 0x5, 0x332, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r0}, 0x48) 10:33:03 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000640)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_open_procfs(0x0, 0x0) 10:33:04 executing program 4: epoll_create1(0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) [ 356.991098] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:33:04 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000002400)='/dev/input/mice\x00', 0x0, 0x2a002) write$9p(r0, &(0x7f00000000c0)="d451c52832def0e405cd46695851356a2ce80d8708baede225cbb3a0f3", 0x1d) 10:33:04 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) r3 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x200240, 0x4) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r3, 0xc058534f, &(0x7f00000001c0)={{0x2, 0x2}, 0x0, 0x3, 0xf72, {0x5, 0x5}, 0x2, 0x6}) [ 357.122021] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:33:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="8500008af7d46452fbde490000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 10:33:04 executing program 5: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter6\x00') splice(r1, 0x0, r0, 0x0, 0xffff, 0x0) 10:33:04 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') splice(r1, 0x0, r0, 0x0, 0xffff, 0x0) 10:33:04 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200)=r1, 0xfffffffffffffc48) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) socketpair(0x3, 0x80800, 0xffff, &(0x7f00000001c0)) 10:33:04 executing program 4: epoll_create1(0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 10:33:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="8500000008001a00a6f84675fdc58943de76a08dba9ea49c13a7af14dc1598"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 357.600056] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. [ 357.671881] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:33:04 executing program 3: socketpair(0x20009, 0x20000806, 0x8000000000005, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$kcm(0x10, 0x800000000002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000140)=ANY=[@ANYBLOB="850000000ca300db1ca908000000c603d2b1399500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000040)=r3, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x1ff}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f00000002c0)={r4, 0x3}, 0x8) accept$inet(r0, &(0x7f0000000200)={0x2, 0x0, @empty}, &(0x7f0000000240)=0x10) 10:33:04 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x10000, 0x0) write$selinux_attr(r2, &(0x7f0000000200)='system_u:object_r:semanage_store_t:s0\x00', 0x26) 10:33:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$mice(&(0x7f0000002400)='/dev/input/mice\x00', 0x0, 0x2a002) write$9p(r1, &(0x7f00000000c0)="d451c52832def0e405cd46695851356a2ce80d8708baede225cbb3a0f305bbe786e242b1749ab2aaa79c4bee468db35c5b60c123b5f018f4a0145b4961cda9bc3dc0281171814d2d686a3b42f0aef6bf03d28aa09d67260b0eaa5bf9a0f02b44f82e40e185979ab1820e3d57d030790c42d6d97cf6b7a7aa50a5fbcbaf327b8861093b2cf20e4720411177d905c00b4e2cf428c8359845b47c0d42e018607be6e499c1f6046bb282e6a6edce7b3a54c07b2a26eda83ba737ed4b9a6880eb92276ba0a79a64e26ce4cb8243ee9d09c58aeb7763b6cb9954d786ac627b845b78fb3d54ed6c1967731b59528d9d8e4e707d4f12a47d08e8963c1f4fe5f31ed80a922cdc7f4b80963357102b67a698e75f9eaca5c76c2681bb9da33fb2cc93d0c56c13587d4fe292f62d8146f8fb5407d4b0d762531af07c5a547b8550a897aed0acc5fa3fb4aedf8298dc0c514297667535cc5931ec78210d19a11abeae73fa7fd4c5bf31cb7942f4e8417d78c3df723c2c66de11801bc291b5209a8a768bc537029ce45c1d1e249802fd53bed0812cc0c5f0acc2f50facb471fdc0bb9d07f02556a78ddc53a3995fdbc01adf62e3a7c0e2ad24aa2dde2983280f537aafec03050d911411e6912a4ca1757b2a525cdd504a2af6262dd598db8daee132d8216027224d50239ae898cc6dcfd7494647b44a9cab15ced48a3b788310ff2369ae9cd9981e95fd6ba82a039ff51b85ad8b14c092b84d7befeea6359e68a8eec4d61c0c0a0df66afc6f12a1cd190b9ffb8c50d49ff698fe6c2d385ef8b8fba4813f4369360fd90951114c260579b89d448f6ad1c4eaf8dd14ebc443b2328e4b8e8f758c4a87918263cb680612e7e7831600a965abbdd2473986672419b4f51e6cc89b59c30ea88f851acd6d39516c89d0043f2192625d08120e37193916599c1f9d2be8fd8518be33765dd91ddc3903ab4bfdb02928322d7abbc9a46d861b147f520febb811ed0630c579da05364dab4adf651047e46b90089e39d59d467046da84d866b1546523193b1db81d9e26bb38992caf5317751858322d4c487b12b862a7c39a2f356c0bd23f3dbe5e29fdcd9fa4035c55c34483a5a64f61f0eb908406991d3b2b3260e8dfd25b8a0020ac978ccd9ba6f78171ac3595c4e9277a7b872457054c12f4e30417d4a053b84b469833cfb0c0b848b356123aa88846555eacbb1d99fcfea169445dab1e1b53de9934e476ee1438ef4ffea8e48606aa529ab317e7c61579043a222acc7d94a65facf072739d4b312562c37f017521e9bea215217ed4ece68ca212b7f290cff546679b34861361b557b705365584777a379ae776a6cbd275e95afda7bcafb2e5eafedff3f18f3c5196226e21f3562efaa0c0c437101767ac2c4188af2d373bd3f00440c806459d565e175b33c5f08fb6dd59c3c228be8356e1f4c9bcf291090d635a749b0967a64854df9aeafbc365cdb2a4adb9a2a910ee69d42b14d0f2f1d66b16e2e0e3ea686622598ebe77ade939e15385b8edf4bef447a40c95ce6132b9ffc4c2cfd8a1a2f727c2b88f534c2364b76eaf46cfa949de4d461eff3c3d487d61db0c37d0dd2bb44b1c593304e1bd84fccc5e0b0082f8222e5a4b6ebb86541fb5f2954067bb660b1103a74f622b754da1042e30b5dcd35b0a2fb4d4cb287b9ba15be6a48b5098d6df69b7fe7b3543018491f62aa9125de847d91bd09f5c975e62bbb1e8200b7690483093840ee1c866da086aa78e4b534bfa25a889ee608f80672990c87631a9c90a355396e64670512c8d24def3ef42236f1c4bd2919f0e6befe1050fc0d8e8ac880f6e848596ff8f2977d9c7abf51fb7365a106063d6c89c1b5dee8d1fb2f1f459f9ddc94ea5903847b2f066b9499bbdcc4572c9db2fca88609d8b1ee59c48d66960fd3ec31baaadcbb726699273d1d7643395f8cd11aa4d61850d534a2cfe0c23d0ebc54e9e2e330de5e1a6550c095e1534fb2b8e8fe1dd3093582ba7a7797a94db8fe033a4aece9b3d17ec46b3cd5aef161a7bf0b5e3c0933a38fde176941c0e6141ef7c536ed0fa4e17043d874e394024c7631d9688219bb8766c19be4b4d3745820057a506eaf815d298ae35857bcb6a5a5f01a3872813cb7bde44da7c78adbda5aafe10494e227c4b0f9c6318366c1dec4627b53cb6b9c8c1abf254a499db7453a156081a4506d757abda934dd10686b62b34387ce98e086bcb57e747b6daa47c03b691d1695ddf94fea4865f1e36e1a80a018979803d877af6ab579ffad4287938ba6ae5a8e2235fb3dd69f229", 0x660) 10:33:04 executing program 2: getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x14) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2000001, 0x0, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f00000005c0)='syzkaller\x00K|\xd4\xec!#\xa0/\xf4\xd8\xcaAvU\xc6g\xa1I\xfe\xb2\xef/\xe2\xbd:\x82\x8c\xda\xa2\xfdfXx\x83K\xd0i\x03\xb4\xadV\xd7@\xf95\xab\b\x9c5N\x84L\x93\xf9\x82\x96\xb5\xe8-\xbbl!\xef#\xdf\xda\x1cI\x1c\x94\xe5\r\x13\xbfd \x8b\xffB\xf5\xdf+)\n\xa7\xb1W\xc6\x1c*\xbe\x01\x15\x8cv\xc6\x8as\xf8\xb2f,\xdb\xf5\x9f\xfd3\x9fR\xc0W\xc9$qg\x8c\xb5\xbe\xcc\xc0f\xc7\xc2\x99\xe5\xc8\xa6\xfd\xf9\xdf\xc6\xaa\x81\x02\x04\v\x8d\xb9\a9\aQ\xc0qS\xde\x8fS\xcc\x83\xcd+\x83\x01\xce\xdc\'\xbc\xa1\x1dm\xcf\t\x93\x87;\xf4\xee:\xddl\xbeeP\xdd\xedd\x95\xccO\xf9\xbc\xa3\xe4\x9b\x82\xc7\x00\xde\x84\xd2z\xe0>\xbb\x83}\xb7!T\x98lp\xa1jl\xc3\xaaC\x10M3\xdc\xacq\xae\xd0\xedu\x9c', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0xf}, 0x48) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x2000, 0x0) ioctl$BLKRRPART(r0, 0x125f, 0x0) 10:33:04 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="02072a701000000000000000000000000800120000000100000000000000000006000000000000000000000000008200e00040e0ff00000000000000000000000000ada8008004000000200000000000030006000000000002000080ac14ff9df0000000000000000300050000000000020012531d08000000200000000000c7"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x9c4dc454d0bbb5, 0x0) [ 358.021387] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:33:05 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'syzkaller0\x00'}) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x715202, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000640)=0x1f) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r3 = fcntl$dupfd(r1, 0x0, r1) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rt6_stats\x00') ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f00000001c0)={0x1, r4, 0x1}) getsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000140), &(0x7f0000000240)=0x4) 10:33:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xf, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x46}, @exit, @ldst={0x2, 0x1, 0x6, 0x6, 0x0, 0xc, 0xfffffffffffffffc}, @alu={0x7, 0x101, 0xf, 0x5, 0x1, 0xfffffffffffffff4, 0xfffffffffffffff4}, @call={0x85, 0x0, 0x0, 0xd}, @alu={0x0, 0x7f, 0x8, 0xa, 0x8, 0x2, 0x1}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x98}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000000180)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0xfffffffffffffffe, [], 0x0, 0x8}, 0x48) 10:33:07 executing program 4: clock_adjtime(0x0, &(0x7f00000001c0)={0x27ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1000000}) 10:33:07 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x101000, 0x0) sendto$inet(r2, &(0x7f00000001c0)="be82d1cbc6a3e3bbd894a43cea638cf513f4b9f23c49b18a5702df55b9b554cdd682a09c4da4df073f7fc022b43f1eaed262650d5be790c78f6b0e3656924f17a63d5fa9f8b1c44182175d8d4f9237b12f85b0dc75fe86144754f3e17933a79d8b533f9f9310af8b2a1ed05b11f5e27e9fffcc3bec5b359df922e561853d5f44731d5db11a105ed27d1fc0796b405cbf6a94f910d61f394d3ce44e3914b38aa55bdb4c5280591b24e4a4452640f08bdb2de1081c967894bde94e71efdb6c478f95e484976f44986ff9033135b539f3d727e0632cd379b3870e583bcf9692", 0xde, 0x4000000, &(0x7f00000002c0)={0x2, 0x4e22, @loopback}, 0x10) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x400000, 0x0) 10:33:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 10:33:07 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip6_tables_matches\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x7, 0xe, &(0x7f00000001c0)=@raw=[@jmp={0x5, 0x1, 0x0, 0xf, 0x0, 0xffffffffffffffe0, 0x18}, @map={0x18, 0x7, 0x1, 0x0, r0}, @generic={0x100000000, 0x2b, 0x6, 0xfc00000000000000, 0x6}, @call={0x85, 0x0, 0x0, 0x53}, @call={0x85, 0x0, 0x0, 0x4b}, @initr0={0x18, 0x0, 0x0, 0x0, 0xd0a, 0x0, 0x0, 0x0, 0x401}, @map={0x18, 0x8, 0x1, 0x0, r1}, @jmp={0x5, 0xffffffffffff8000, 0x0, 0x3, 0x5, 0x0, 0x1}, @jmp={0x5, 0x81de, 0x0, 0x5, 0x9, 0xfffffffffffffffc, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000140)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x1, [], r2, 0xf}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x4000, 0x0) 10:33:07 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r2 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000012c0)={0x0}, &(0x7f0000001300)=0xc) getresuid(&(0x7f0000001340)=0x0, &(0x7f0000001380), &(0x7f00000013c0)) getresgid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)=0x0) r6 = getpid() getresgid(&(0x7f0000001600), &(0x7f0000001640), &(0x7f0000001680)=0x0) sendmsg$unix(r1, &(0x7f00000017c0)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001280)=[{&(0x7f0000000280)="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", 0x1000}], 0x1, &(0x7f0000001d00)=ANY=[@ANYBLOB="30000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="20000004000000000100000002000000e9fd88da580e0bc84afa6cfda861b5781c1003c5", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r6, @ANYRES32, @ANYRES32=r7, @ANYBLOB="400cb28ef000080000a5c51961b9b54857d1e832cfb73e495214da793fd7a6780c6390bf1bbeba277bbdeb1f93ab0cb075de4e2b0f24dff1bac202e6c41cbb17426702d6de404a444fbb44ac9de0e3a6d9f291d7b7f77aae8d5579129ead2f1077e5878920b937685c5902175aaf801aa5df6367e3bec58afac22e46e360ec1c1882ac1b2943f0b3eadfa31228b9bbda72b78f6fea2132b16f1df6ac1dd3ebe7c5957d436c689dd14bf9d93defd82f0b179578e554b6ee9bfeef802a14ede9a36dea0506bfe9488e02faecff3615e830eb6b52849f6291d361c5d17d7e1b5fa309b2beaa2493e4e92aeeb7b13d24"], 0xe0, 0x800}, 0xd0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r8, 0x4) syz_open_dev$usb(&(0x7f00000016c0)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x80000) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f00000014c0)) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:33:07 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f00000000c0)='mqueue\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0/bus\x00', 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) mq_notify(r0, &(0x7f0000000140)) [ 360.668884] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:33:07 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:33:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'veth0_to_bridge\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="01"]}) 10:33:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000100)) 10:33:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x2200, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000280)={'mangle\x00', 0xf4, "3a93027ece922de574cd8dfdcea9ddfb7b9e78a5094c9f4a95342145f6dd9c642b0ff4e52f25723510edc2b30c678bb76dc7bb075fcb584bcfb0adedcd69ba639b02bccc78c71fec8f01978048ea6fa09331134eb4b54a38d43eb10454564fc335ce4656aa89e27c709f044d58ae282fe55bbe5703a5c365b22e5a8eaae52f324a9884a605fc8485a220b4aa18490b79be87d5be3f925e1b02bb914de43aa46099952fee6661b3a7e7c2fabee29d88746de8d0da4b3dc733ea161bdafd53d47a86c03c23aa0dc77f19ef34e485ddc01c28abb8e055e9dbf835b5066e1988b02f1bb2e7e6f6587b733bcbddb4af9e5702216f377d"}, &(0x7f00000003c0)=0x118) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x400000, 0x0) ioctl$KVM_SET_ONE_REG(r3, 0x4010aeac, &(0x7f0000000200)={0x9, 0x7}) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000440)={0x2, &(0x7f0000000400)=[{}, {0x0}]}) ioctl$DRM_IOCTL_GET_CTX(r3, 0xc0086423, &(0x7f0000000480)={r4, 0x2}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:33:08 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="a666000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x8000, 0x2800) ioctl$UDMABUF_CREATE(r2, 0x40187542, &(0x7f0000000140)={r1, 0x0, 0x100001000, 0x1008000}) 10:33:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="8504000000000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 361.089515] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:33:08 executing program 5: clone(0x200000041fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) ptrace(0x10, r0) ptrace$setsig(0x4203, r0, 0x0, 0x0) 10:33:08 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0xfffffffffffffffd}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:33:08 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20000005401}) r4 = socket$nl_route(0x10, 0x3, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="1483000007f100070025"], 0xa) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 10:33:08 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000200000000000", 0x2e}], 0x1}, 0x0) [ 361.461836] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 361.468781] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:33:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x2, 0x101080) write$P9_RATTACH(r0, &(0x7f0000000080)={0x14, 0x69, 0x1, {0x0, 0x0, 0x4}}, 0x14) 10:33:08 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200)=r1, 0x4) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x20002, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000001c0), 0x4) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x800) ioctl$ASHMEM_GET_PIN_STATUS(r3, 0x7709, 0x0) [ 361.542382] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 361.558703] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:33:08 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth1_to_team\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="10000000000000000000000000000090"], 0x10}}], 0x1, 0x0) 10:33:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) 10:33:08 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x101001, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000240)=ANY=[@ANYBLOB="85000000080800e42cce7c2fe3d834005f8935b4f04e75bfeb9598f111c6cf88bb91d1fd518b4758f457b8d6b1b225de0b9291c17168abba2d0dc6cb8966e9a19e24cd"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) 10:33:08 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) select(0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x1000000000016) 10:33:09 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000008928d05b800000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:33:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0) [ 362.067009] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:33:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f00000001c0)=ANY=[@ANYRESOCT], &(0x7f0000000400)='\x7f\x96\xc3\xcb\xea\xa6\x06I\xff\xca\xc0tc\xb7\x95z\xddV\xdb\xa0\x00\xf1\x83\xca\x1b', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x40f00, 0x0, [], 0x0, 0xfffffffffffffffe}, 0x48) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80802, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000440)={'filter\x00'}, &(0x7f0000000040)=0x44) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x12, 0xa, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf0, 0x0, 0x0, 0x0, 0x6a067ee6}, [@jmp={0x5, 0x2, 0x7, 0x2, 0x1, 0x70, 0x8}, @ldst={0x3, 0x1, 0x0, 0x7, 0xf, 0x30}, @map={0x18, 0x6, 0x1, 0x0, r0}, @map={0x18, 0x5, 0x1, 0x0, r1}, @generic={0xd6, 0x600000000, 0x8, 0x100000000, 0xfffffffffffffffb}]}, &(0x7f0000000200)='syzkaller\x00', 0x9, 0xe2, &(0x7f0000000240)=""/226, 0x40f00, 0x1, [], r2, 0x7}, 0x48) 10:33:09 executing program 1: r0 = socket(0x80000000000000a, 0x10000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3a, 0x0, 0x0) 10:33:09 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000000c0), 0x4) recvmsg$kcm(r0, &(0x7f0000000140)={&(0x7f00000001c0)=@xdp, 0x80, &(0x7f0000000080)=[{&(0x7f0000000240)=""/136, 0x88}, {&(0x7f0000000300)=""/212, 0xd4}], 0x2, &(0x7f0000000400)=""/144, 0x90}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 10:33:09 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000008000000950000007c3f9fe8"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) epoll_wait(r2, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0xc10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f00000004c0)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r2, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r3, 0x900, 0x70bd25, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x2004c850}, 0x8005) r4 = openat(r0, &(0x7f0000000280)='./file0\x00', 0x478280, 0x20) ioctl$IMHOLD_L1(r4, 0x80044948, &(0x7f00000002c0)=0x5) prctl$PR_SET_PDEATHSIG(0x1, 0x5) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x10800}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x1c, r5, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x11}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000005c0)={'ifb0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000600)={{0x400, 0xfffffffffffffffa, 0x7, 0x4}, 'syz0\x00', 0xe}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000440)) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x200000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000680)='/dev/net/tun\x00', 0x41, 0x0) getsockname$netlink(r6, &(0x7f0000000200), &(0x7f0000000240)=0xc) ioctl$VIDIOC_SUBDEV_G_EDID(r2, 0xc0285628, &(0x7f0000000400)={0x0, 0x2, 0x1, [], &(0x7f00000003c0)=0xffffffff}) 10:33:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000100)='./file0/bus\x00', 0x0) mq_notify(r1, 0x0) [ 362.439687] sctp: [Deprecated]: syz-executor.3 (pid 14429) Use of int in maxseg socket option. [ 362.439687] Use struct sctp_assoc_value instead [ 362.477213] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:33:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000000)={{}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x300008}) [ 362.528858] sctp: [Deprecated]: syz-executor.3 (pid 14435) Use of int in maxseg socket option. [ 362.528858] Use struct sctp_assoc_value instead 10:33:09 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x9, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000140)={0x80000001, 0xfffffffffffffff8, 0x5, 0xb6d6, 0x0, 0x6}) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x408}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x48, r1, 0x0, 0x70bd2c, 0x25dfdbfc, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0xff}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xfffffffffffffffe}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x6}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffffffffffff800}]}, 0x48}}, 0x20004890) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="0900000008fbffff9e00000100000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 362.655216] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 10:33:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x2f5, 0x200007fc, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) 10:33:09 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x1ff, 0x2800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x6, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x9}, [@jmp={0x5, 0x0, 0x3, 0xf, 0xa, 0xffffffffffffffff, 0xffffffffffffffff}, @map={0x18, 0xb, 0x1, 0x0, r1}]}, &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x1, [], r2}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r3, 0x4) epoll_create1(0x80000) 10:33:10 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000000)=0xffffffffabc64025, 0x4) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000280)=""/66, 0x42}], 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 10:33:10 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000180)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c) sendfile(r0, r1, 0x0, 0x8010) r2 = socket$kcm(0x10, 0x800000000002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f00000002c0)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000040)=r3, 0x4) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f00000003c0)={@rand_addr, 0x0}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r1, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000440)=@ipv6_getroute={0x38, 0x1a, 0x110, 0x70bd25, 0x25dfdbfd, {0xa, 0x80, 0x14, 0x3, 0xff, 0x3, 0xff, 0x9, 0x100}, [@RTA_OIF={0x8, 0x4, r4}, @RTA_GATEWAY={0x14, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x1) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0xffffffffffffffd8}], 0x1}, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x222000, 0x0) ioctl$TUNSETTXFILTER(r5, 0x400454d1, &(0x7f0000000200)={0x1, 0x7, [@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @empty, @empty, @remote, @broadcast, @random="aa348165c061", @empty]}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f0000000240)={0x1, [0x2]}, 0x6) get_thread_area(&(0x7f0000000140)={0xf4, 0xffffffffffffffff, 0x2000, 0xfffffffffffff410, 0xe6, 0x6, 0x20, 0x1ff, 0x9, 0x1a6a}) 10:33:10 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffdfc) 10:33:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) 10:33:10 executing program 5: 10:33:10 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x7) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) socket$kcm(0x10, 0x800000000002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) bind$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500e8ff070000000000000000200099c7609195761cbb2a591f84e8c4cc3f3a2f00757109b5d947e546e68dea893815eab5840e8d3a1d7ffd14ac3cf11c8ef2472603c5957ab8881ae87f961be14a54bcfa6060a9d8fdd486dc0f3e6c78fa35aebcf0ea5b5207ac38d79ca452036ca28d50ddfed82696038ebb528100e55b41392f097eaa802680375e8cc32ada392b68fd1edec95e4108df65f31fa058dd3597ebd7adf8633210a2b02fe5fcdcd6659c6cc35353fa2c5c7acf12541234d4e613d0f700000000620d41e94700261d1171fa124504"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0xffffffffffffff09) [ 363.341508] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 10:33:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x40) r1 = dup2(r0, r0) clone(0x200, 0x0, 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x10d) dup2(r2, r3) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000140)="b1faca2ef89cc221e408be098f02b5da9673373fcaa1afd700e72b8ef5a950e35967b84d59bd8152d31d6a57dbbe0e311c6dd55bc09f65ee9917d05e4631d0b81e388013168e1a748a0371c5f003bf6a1e578980a1f9c1498b21efd0bd10241ff058001552c971664a542fd110ee981f6f95a10e40966c92810ac748018b2c1c61dd1b301105a8993b1e572c41994c9808f97ed7027d737632aa2a9c649e337e9fce5ea360dbda5da60322276ca6af961166394553821455edbd843e5a96c369f524b26e2bdac7d091", 0xc9, 0x40, 0x0, 0x0) 10:33:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000380)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000280)="050000002300000000028900ac14140de0", 0x11}], 0x1, 0x0, 0x0, 0x50}, 0x0) 10:33:10 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='.', 0x1, 0xfffffffffffffffc) keyctl$get_keyring_id(0x0, r0, 0x0) 10:33:10 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e000000280081aee4050cecdb4cb9040a485e510b00000000000000ffffffff0000800000000000000000000000", 0x2e}], 0x1}, 0x0) [ 363.708136] ================================================================== [ 363.715614] BUG: KMSAN: uninit-value in nf_nat_setup_info+0x700/0x3b00 [ 363.722318] CPU: 0 PID: 14501 Comm: syz-executor.2 Not tainted 5.0.0+ #11 [ 363.729556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.738952] Call Trace: [ 363.741606] dump_stack+0x173/0x1d0 [ 363.745285] kmsan_report+0x12e/0x2a0 [ 363.749126] __msan_warning+0x82/0xf0 [ 363.753004] nf_nat_setup_info+0x700/0x3b00 [ 363.757401] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 363.762798] nf_nat_inet_fn+0x106c/0x11f0 [ 363.767037] ? metadata_is_contiguous+0x8b0/0xbc0 [ 363.771923] nf_nat_ipv4_local_fn+0x2bf/0x870 [ 363.776457] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 363.781680] ? nf_nat_ipv4_out+0x790/0x790 [ 363.785937] nf_hook_slow+0x176/0x3d0 [ 363.789783] __ip_local_out+0x6dc/0x800 [ 363.793814] ? __ip_local_out+0x800/0x800 [ 363.798033] ip_local_out+0xa4/0x1d0 [ 363.801800] iptunnel_xmit+0x8a7/0xde0 [ 363.805778] ip_tunnel_xmit+0x357d/0x3ca0 [ 363.810024] ipgre_xmit+0x1098/0x11c0 [ 363.813874] ? ipgre_close+0x230/0x230 [ 363.817795] dev_hard_start_xmit+0x604/0xc40 [ 363.822272] __dev_queue_xmit+0x2e48/0x3b80 [ 363.826696] dev_queue_xmit+0x4b/0x60 [ 363.830523] ? __netdev_pick_tx+0x1260/0x1260 [ 363.835136] packet_sendmsg+0x7d3a/0x8d30 [ 363.839348] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 363.844851] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 363.850082] ? aa_sk_perm+0x605/0x950 [ 363.853989] ___sys_sendmsg+0xdb9/0x11b0 10:33:10 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x400, 0x400) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240)='sit0\x00', 0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000280)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000002c0)) r2 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0xffffffff, 0x40) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x3, 0x8010, r2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000080)='./file0\x00', r2}, 0x10) r3 = socket$kcm(0x10, 0x800000000002, 0x0) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000340)={0x0, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e24, @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x63d, &(0x7f0000000300)='bcsf0\x00', 0x5, 0x67a}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r2, 0xfe7d) 10:33:10 executing program 4: r0 = open(0x0, 0x0, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1, 0x81003) read(r1, &(0x7f0000000200)=""/250, 0xfffffffffffffdfc) [ 363.858106] ? compat_packet_setsockopt+0x360/0x360 [ 363.863694] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 363.868941] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 363.874349] ? __fget_light+0x6e1/0x750 [ 363.878393] __se_sys_sendmsg+0x305/0x460 [ 363.882636] __x64_sys_sendmsg+0x4a/0x70 [ 363.886736] do_syscall_64+0xbc/0xf0 [ 363.890497] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 363.895709] RIP: 0033:0x457f29 [ 363.898929] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 363.917861] RSP: 002b:00007f658dd31c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 363.925626] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457f29 [ 363.932930] RDX: 0000000000000000 RSI: 0000000020000400 RDI: 0000000000000005 [ 363.940235] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 363.947537] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f658dd326d4 [ 363.954840] R13: 00000000004c5561 R14: 00000000004d9408 R15: 00000000ffffffff [ 363.962151] [ 363.963791] Uninit was created at: [ 363.967339] No stack [ 363.969676] ================================================================== [ 363.977053] Disabling lock debugging due to kernel taint [ 363.982531] Kernel panic - not syncing: panic_on_warn set ... [ 363.988461] CPU: 0 PID: 14501 Comm: syz-executor.2 Tainted: G B 5.0.0+ #11 [ 363.997536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.007000] Call Trace: [ 364.009654] dump_stack+0x173/0x1d0 [ 364.013325] panic+0x3d1/0xb01 [ 364.016606] kmsan_report+0x293/0x2a0 [ 364.020455] __msan_warning+0x82/0xf0 [ 364.024301] nf_nat_setup_info+0x700/0x3b00 [ 364.028721] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 364.033958] nf_nat_inet_fn+0x106c/0x11f0 [ 364.038181] ? metadata_is_contiguous+0x8b0/0xbc0 [ 364.043076] nf_nat_ipv4_local_fn+0x2bf/0x870 [ 364.047641] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 364.052880] ? nf_nat_ipv4_out+0x790/0x790 [ 364.057149] nf_hook_slow+0x176/0x3d0 [ 364.061007] __ip_local_out+0x6dc/0x800 [ 364.065035] ? __ip_local_out+0x800/0x800 [ 364.069222] ip_local_out+0xa4/0x1d0 [ 364.072982] iptunnel_xmit+0x8a7/0xde0 [ 364.076949] ip_tunnel_xmit+0x357d/0x3ca0 [ 364.081203] ipgre_xmit+0x1098/0x11c0 [ 364.085053] ? ipgre_close+0x230/0x230 [ 364.088971] dev_hard_start_xmit+0x604/0xc40 [ 364.093451] __dev_queue_xmit+0x2e48/0x3b80 [ 364.097843] dev_queue_xmit+0x4b/0x60 [ 364.101689] ? __netdev_pick_tx+0x1260/0x1260 [ 364.106214] packet_sendmsg+0x7d3a/0x8d30 [ 364.110408] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 364.115893] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 364.121114] ? aa_sk_perm+0x605/0x950 [ 364.125004] ___sys_sendmsg+0xdb9/0x11b0 [ 364.129109] ? compat_packet_setsockopt+0x360/0x360 [ 364.134172] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 364.139402] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 364.144801] ? __fget_light+0x6e1/0x750 [ 364.148827] __se_sys_sendmsg+0x305/0x460 [ 364.153025] __x64_sys_sendmsg+0x4a/0x70 [ 364.157102] do_syscall_64+0xbc/0xf0 [ 364.160837] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 364.166043] RIP: 0033:0x457f29 [ 364.169247] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 364.188168] RSP: 002b:00007f658dd31c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 364.195984] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457f29 [ 364.203266] RDX: 0000000000000000 RSI: 0000000020000400 RDI: 0000000000000005 [ 364.210635] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 364.218014] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f658dd326d4 [ 364.225303] R13: 00000000004c5561 R14: 00000000004d9408 R15: 00000000ffffffff [ 364.233452] Kernel Offset: disabled [ 364.237091] Rebooting in 86400 seconds..